Proxy re-encryption: Difference between revisions

Content deleted Content added
Dachshund (talk | contribs)
No edit summary
Ryan Prior (talk | contribs)
This page could use some additional organization and links to source sites.
Line 1:
{{cleanup}}
''This page could use some additional organization and links to source sites.''
 
'''Proxy re-encryption''' schemes are [[cryptosystem]]s which allow third-parties (proxies) to alter a [[ciphertext]] which has been encrypted for one party, so that it may be decrypted by another. For example, Bob could designate a proxy to re-encrypt message encrypted for him so that Charlie can decrypt them with his key. When Alice sends a message encrypted under Bob's key, the proxy alters the message and thus Charlie can decrypt it. This makes possible a number of applications, including email forwarding, law-enforcement monitoring, and content distribution.