Content deleted Content added
No edit summary |
Ryan Prior (talk | contribs) This page could use some additional organization and links to source sites. |
||
Line 1:
{{cleanup}}
''This page could use some additional organization and links to source sites.''
'''Proxy re-encryption''' schemes are [[cryptosystem]]s which allow third-parties (proxies) to alter a [[ciphertext]] which has been encrypted for one party, so that it may be decrypted by another. For example, Bob could designate a proxy to re-encrypt message encrypted for him so that Charlie can decrypt them with his key. When Alice sends a message encrypted under Bob's key, the proxy alters the message and thus Charlie can decrypt it. This makes possible a number of applications, including email forwarding, law-enforcement monitoring, and content distribution.
|