# newbie Q: "Stacked" public key algorithm

sorry for the stupid question. Up to now I was just a cryptography user
without really understanding the technique behind, but now I've a question
regarding a solution I'm looking for, a kind of "stacked public key
algorithm"...

Image, a company has a public and a secrect key. Employes also have their
own key pair. The planned scenario is like that:

the employee (Alice) send her public key to the company.

the company "mixes" their own private key with the public key of Alice and
send it back to Alice. Let us call this the "mixed key"

Alice can use this "mixed" key together with her own private key to read
messages with where encrypt with the company public key, means messages
which were "sent do the company".

But Alice should not be able to seperate the company private key again out
of her mixed key, so that she can't give the company private key alone to
somebody else without telling that she was the one who forwarded the
company secret key.

Do you understand, what I mean? Has anybody ever heard about such a
algorithm???

Good question, isn't it?

Any hints are appreciated & many thanks in advance

best regards

Steffen

.

## Relevant Pages

• Re: Encryption question
... Bob can't decrypt the ... >If alice sends a message to bob, and what him to be the only one to read ... combinding a private key and a public to make a new ... >Alice makes a new key with her private and bobs public key. ...
(Security-Basics)
• Re: newbie Q: "Stacked" public key algorithm
... the employee (Alice) send her public key to the company. ... Alice can use this "mixed" key together with her own private key to read ... Where you'd asymmetric encrypt a short random secret ...
(sci.crypt)
• Re: Secure logging
... >> a purported copy of the log file. ... >> Alice, though, does not have the luxury of a logging daemon that can ... >> securely remember a private key between the arrivals of log records. ... pair, Pair, which Sue signs the public key of. ...
(sci.crypt)
• RE: Encryption question
... both assuming the private key is not compromised. ... key and the product of those primes to build the public key. ... Bob verifies that the message is from Alice by using ...
(Security-Basics)
• RE: PGP scripting...
... cryptosystems, ... In these systems divulging your private key compromises the public ... Here is a quick over view of the public key encryption routines (the ...
(SecProg)