Processing preferences include, for example, selecting a particular private key identifier identifying a private key to be used for encryption when more than one encryption key is available and selecting an operation to be performed on the data, such as encryption and/or time-stamping.