摘要 |
<p>To mitigate the effects of a weak random number generator (34) in a public key cryptosystem, a public key obtained from the random number generator (34) is encrypted using a deterministic cryptographic scheme before being made publicly available. A trusted party (14) receiving the encrypted public key can recover the public key and combine it with other information so it is not subject to direct scrutiny. In one embodiment, the trusted party (14) incorporates the public key in a certificate, such as an implicit certificate, for use by the correspondents in other communications.</p> |