How can public-key encryption be used to distribute a secret key? Provide a real-world example.
a) By encrypting the secret key with the recipient's public key
b) By decrypting the secret key with the recipient's private key
c) By sharing the secret key in plain text
d) By using a symmetric encryption algorithm