A method by which two or more entities separately have key components or key shares that individually convey no knowledge of the resultant cryptographic key.