Content deleted Content added
dead link |
Tag: Reverted |
||
Line 5:
Bob could designate a proxy to re-encrypt one of his messages that is to be sent to Charlie. This generates a new [[Key (cryptography)|key]] that Charlie can use to decrypt the message. Now if Bob sends Charlie a message that was encrypted under Bob's key, the proxy will alter the message, allowing Charlie to decrypt it. This method allows for a number of applications such as [[e-mail forwarding]], law-enforcement monitoring, and content distribution.
A weaker re-encryption scheme is one in which the proxy possesses both parties' keys simultaneously. One key decrypts a [[plaintext]], while the other encrypts it. Since the goal of many proxy re-encryption schemes
==Defining functions==
|