The ability to verify the source of a message. Dual-key systems are a useful technique. The sender uses a private key to encrypt the message. The recipient applies the sender's public key. If the decrypted message is readable, it had to have come from the alleged sender, because the keys always work in pairs.