Which of the following do asymmetric cryptosystems provide?
a. confidentiality
b. authenticity
c. non-repudiation; Confidentiality is provided by the encryption and decryption functionality, while authenticity and non-repudiation are ensured by the signing and verification processes.