This refers to so-called key escrow, i.e. the possibility for a higher-level entity to obtain a user’s private key. This is generally not desired in the private sphere, but is useful for the internal use of cryptography within a company.
Recent Posts
- Newly published: Atos whitepaper on post-quantum cryptography
- Newly published: cryptovision special issue of “The Vault” magazine
- US standards body NIST announces four winners in post-quantum competition
- Mindshare 2022 video: Two great days in 70 seconds
- New GreenShield version receives BSI approval