A. Public authorization key
B. Public ephemeral key authorization key
C. Asymmetric authorization keys
D. Symmetric authorization keys