public key

(redirected from private keys)
Also found in: Encyclopedia.
Related to private keys: Asymmetric cryptography

public key

n.
One of two keys used in public key cryptography, made publicly available by the recipient of encrypted data and typically used to encrypt data and to verify digital signatures.
Translations
clé publique
References in periodicals archive ?
Hilltop Cybersecurity has launched a new wallet for cryptocurrency coins and private keys protected by user biometrics.
The hacker, identified online as Norbertvdberg, began collecting private keys for IOTA wallets in August 2017 and finally decided to capitalize on the months long scheme on Jan.
And the bigger the size of the public and private keys, the harder the system is to crack.
Due to the exorbitant dependence on a PKG to generate all the private keys of users, ID-PKC has the problem of key escrow, and this problem is certainly remained in an ID-PRE.
By employing an identity-based re--encryption scheme, the information storages, which are method of regional clouds, can re-encrypt the received confidential data from the end-user devices so that services requested by the end-users decrypt and process the confidential data without compromising the information storages' private keys.
Keypasco has invented, and patented, a new innovative way of using a user's mobile device as a secure soft carrier of private keys.
Software accessible through the Ingenium website is used to generate both public and private keys to a printable size which are then concealed by the hologram on the reverse of the coin.
Two white-hat hackers were able to extract keys and were able to use Heartbleed to extract private keys in a competition set up by data security company CloudFlare.
12 ( ANI ): A content distribution network has reportedly revealed that the Heartbleed bug may not be as dangerous as thought because with two weeks of testing the company has been unable to successfully access private keys with the bug.
Users to use some software to generate a pair of public/ private keys.
If you must continue to use wildcard certificates, you must also enforce policies and take extreme precautions to ensure the security of their corresponding private keys, by using an HSM to store them or FIPS 140-2 algorithms to secure them, for example.
In many organisations, the individuals or admins who install the certificates to protect the data often have unfettered access to the private keys for those same certificates.

Full browser ?