Sensitive electronic data may be encrypted using multiple identity credentials from multiple parties. Before the sensitive electronic data is encrypted, the multiple N identity credentials are input to a software application. Moreover, a minimum number N