In The Complete Cyber Security Volume 1 --> Section 4 --> Encryption Crash Course --> Time 2:38 secs.
When Sender encrypts the with receiver public key, there wont be authentication. Receiver cannot know who sent it. But in above video at 2:38 secs it has been mention as – The Identity of the communicating parties can be authenticated using public Key cryptography certificates.
My questions is how can communication of parties authenticated when using public key.