Ray Dillinger wrote:
> 
> On Mon, 14 May 2001, Rafael Coninck Teigao wrote:
> 
> >    What I'm looking for is sort of this: there is a public key that can be
> >used to create the cyphertext (only one public key) and a set of private keys
> >that can be used alone to get the cleartext from this cyphertext.
> 
> Okay.  Here is one way to do it.  Encrypt the message using a symmetric
> algorithm such as Twofish or AES or something.  Now create a header that
> says what the key you used with the symmetric cipher was.  Make one
> such header for each recipient, and encrypt each header (using an
> asymmetric algorithm such as an elliptic-curve system) with the public
> key of one of the intended recipients.  Put the encrypted message together
> with the encrypted headers, and sign the whole bundle with your own key.
> 
> Now your recipients can each read their header and get the key and then
> unlock the whole document.
> 
> If you want to keep the number of headers down, or need to send to
> a *lot* of different users with unique keys for each user, you can
> use secret sharing to put a dozen messages in the header, such that
> if your recipients can decrypt any six, they can construct the
> symmetric key.  Then you can hand out a different subset of six
> keys to each of the participants.  That gives you thousands of
> different keys to hand out, but only 12 "headers".

You just described PGP.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

Reply via email to