From: karn@qualcomm.com (Phil Karn)
To: hfinney@shell.portal.com
Message Hash: 54947ca5de31b8dfbb661ed99694839c7fb045948eb0b6369c4bb1071d37b5bd
Message ID: <199312010933.BAA27774@servo>
Reply To: <9311290404.AA27229@jobe.shell.portal.com>
UTC Datetime: 1993-12-01 09:37:53 UTC
Raw Date: Wed, 1 Dec 93 01:37:53 PST
From: karn@qualcomm.com (Phil Karn)
Date: Wed, 1 Dec 93 01:37:53 PST
To: hfinney@shell.portal.com
Subject: Cryptosplit 2.0
In-Reply-To: <9311290404.AA27229@jobe.shell.portal.com>
Message-ID: <199312010933.BAA27774@servo>
MIME-Version: 1.0
Content-Type: text/plain
>One possible application is to split up your PGP secret key file this
>way and distribute the pieces to trusted friends such that several of
>them have to cooperate to recover your key. Then if you accidentally lose
>your key you can get the pieces back from your friends.
I don't need to worry much about losing my secret key. I can keep as
many backup copies as I like, in as many different places as I like --
all securely encrypted with my passphrase.
The application for secret sharing would be to allow some subset of
trusted people to regenerate your secret key *without your
assistance*. I could see several situations in which a voluntary
scheme like this could be useful, the main one being if you were to
die unexpectedly.
Phil
Return to December 1993
Return to “m5@vail.tivoli.com (Mike McNally)”