private key


Also found in: Encyclopedia, Wikipedia.
Related to private key: Private key cryptography

private key

n.
1. One of two keys used in public key cryptography and held privately by the recipient of encrypted data, typically used to sign digital signatures and to decrypt data that was encoded using the recipient's public key.
2. A key that is used both to encrypt and decrypt data in private key cryptography. In this sense, also called secret key.
Translations
clé privée
References in periodicals archive ?
Secardeo certPush can either recover only the current certificate and private key of a user or the whole key history.
With the recent celebrity photo leaks, it's a lesson to all consumers to have a better understanding of the benefits of what private key encryption can do, and how it can help protect their most precious and private moments.
While the fact that it was so quickly addressed and brought to light was impressive, what was astonishing was the huge amount of websites that were affected by Heartbleed regenerated their certificates with the same private key.
In an attempt to prove that the bug is not as dangerous, CloudFare has reportedly set up an intentionally vulnerable page and challenged hackers to use Heartbleed to retrieve their site's private key.
You can also simply encrypt the Bitcoin Private Key file and save it anywhere you desire without risking your Bitcoins.
Use their own private key to encrypt the abstract and summary attached to the back of the original message.
Contract notice: Extension systems of public private key (pki), built to serve the process of issuing identity documents to electronic format, including the construction of a single point of contact (spoc) and connection with icao - pkd on border control system.
Wildcard certificates are convenient but can increase the risk of data and system breaches due to increased probability of private key compromise.
A trusted third-party server, called the private-key generator, uses a cryptographic algorithm to calculate the corresponding private key from the public key.
Asymmetric encryption lessens the risk of key exposure by using two mathematically related keys, the private key and the public key.
The IBE system Voltage has created relies on a cryptographic formula that makes it easy to calculate a public key from a unique string like an email address or instant messaging screen name, but almost impossibly difficult to calculate the corresponding private key.

Full browser ?