You are correct that you must assume that any public key gets known by adversaries and used.
I think you want the combination of two distinct things:
- Signature of messages. This will allow the client, and any other recipient of messages, to verify that a message comes from you, unadulterated. That verification requires your public key, that the recipient must know with confidence that it's yours. A signature check will prevent anyone but you from making new messages similarly signed (which is possible only with your private key).
- Encryption of messages. This is will insure confidentiality of the message. Nothing in the question requires public-key (asymmetric) encryption, but it may be the most convenient:
- public-key encryption is available and the Standard Operating Procedure in many encryption tools with support of signature (e.g. OpenPGPG/GPG). However the client must be technically savvy enough for generating a public/private key pair, sending you the public key (and letting you verify it's integrity if it's delivered by insecure means like email).
- symmetric encryption is advisable if that key setup procedure is to be simplified, typically into you communicating a passphrase to the client. This is one (of several) SOP in e.g. Acrobat PDF Reader: the document can be deciphered only with the passphrase, it's displayed with indication that it's signed, and by who.
The tools mentioned above (GPG, Acrobat) will, at least by default, allow decryption of messages that are not signed by you. This is an issue if the recipients do not check the signature. It's technically easy to make decryption of unsigned messages impossible, it's just uncommon, because a general-purpose program must allow multiple authorized signers anyway.