Techniques for generating a private portion of a split private key of an
asymmetric key pair are provided. Multiple factors upon which the private
portion of the split private key is based are received. Each of these
multiple factors is under control of a user associated with the
asymmetric key pair. Multiple cryptographic operations are then performed
using the received multiple factors to generate the private portion.