which states that the computer that the data is being sent to which is B you require the public key to encrypt it and then the person at the receiving end would use his/her private key to decrypt the data which sounds like B being the only correct way.