A method of restricting access to private keys in a public key infrastructure
provides
for storage of an encrypted private key at a primary site. A masked session key
is stored at a secondary site, where the masked session key enables recovery of
the private key. By using distributed storage architecture for recovery data, simplification
can be achieved without sacrificing security.