Abstract: Sensitive electronic data may be encrypted using multiple identity credentials from multiple parties. Before the sensitive electronic data is encrypted, the multiple N identity credentials are input to a software application. Moreover, a minimum number Nmin of the N of the identity credentials are selected for decryption. The software application thus generates at least one of an encryption key and a decryption key as a keypair based on the N identity credentials and the minimum number Nmin of the identity credentials. The software application encrypts the sensitive electronic data using the encryption key to generate an encrypted version. Before decryption of the encrypted version, though, the software application may require input of the minimum number Nmin of the identity credentials. If the minimum number Nmin of the identity credentials are correctly input, the correct decryption key is generated and may be used to decrypt the encrypted version.