How does public-key infrastructure protect information assets