by rrnechmech on 8/22/24, 7:43 PM with 11 comments
by throwaway019254 on 8/22/24, 9:22 PM
This will not take much more space as only the master key is encrypted multiple times.
Now anybody who has one of the keys can decrypt the master key and subsequently decrypt the cleartext.
by solardev on 8/22/24, 9:22 PM
In that case... dumb answer... but couldn't you just encrypt it twice (or n times), with n separate keys? Or encrypt the actual thing with a symmetric key, then separately encrypt the symmetric key with a public keypair for each of n users, such that any one of them could regain the symmetric key for that one thing (but not anyone else's private keys).
by Terr_ on 8/22/24, 7:46 PM
I'm assuming you mean "it requires 2 or more keys but less than all of them", so I'd check variations of: https://en.wikipedia.org/wiki/Secret_sharing
The cases for "any individual key is enough" or "all keys required" are much simpler.
by raincom on 8/23/24, 4:50 AM
https://crypto.stackexchange.com/questions/39397/one-encrypt...
by aborsy on 8/24/24, 5:55 AM
You can encrypt the data encryption key with, say, any 2 keys out of 3. You concatenate any two keys into a single key, and encrypt the master key with that. That gives you Shamir scheme, that used in crypto currencies.
by randompeach on 8/22/24, 10:38 PM
by stop50 on 8/22/24, 7:49 PM
by samrolken on 8/22/24, 7:55 PM