摘要 |
Provided are, among other things, systems, methods and techniques for decryption key management. In one implementation, a decryption key is managed within a computer processing system by (a) creating within the computer system an association between an access token and retrieval information, the access token being a specified function of an identifier for a data object, and the retrieval information including (1) a first entry that corresponds to a value generated by encrypting a decryption key for the data object using a symmetric encryption/decryption key, and (2) a second entry that corresponds to a value generated by encrypting the symmetric encryption/decryption key using an asymmetric public key; and (b) repeating step (a) for a number of different data objects, keeping the symmetric encryption/decryption key identical across repetitions.
|