6.5k views
5 votes
Dave is developing a key escrow system that requires multiple people to retrieve a key but does not depend on every participant being present. What type of technique is he using?

A. Split knowledge
B. M of N Control
C. Work function
D. Zero-knowledge proof

User Geographos
by
8.0k points

1 Answer

3 votes

Final answer:

Dave is using the M of N Control technique, which is a part of threshold cryptography and allows a subset of participants to retrieve a key without the need for all participants to be present.

Step-by-step explanation:

The technique that Dave is using for developing a key escrow system that requires multiple people to retrieve a key but does not depend on the presence of all participants is known as M of N Control. This mechanism allows a subset of participants (M) out of the total group (N) to combine their parts of the key in order to retrieve the complete key. It is highly useful in situations where security and redundancy are important but where it's impractical to require every single participant to be present every time access to the key is needed. M of N Control is part of a broader category of security mechanisms known as threshold cryptography, which can be applied in various scenarios like secure multiparty computation, distributed systems, and cryptographic protocols.

User Dhanaraj
by
7.7k points

No related questions found