Content deleted Content added
m Changing {{cleanup}} to {{cleanup-date|May 2005}} |
m links |
||
Line 1:
{{cleanup-date|May 2005}}
:''This page could use some additional organization
'''Proxy re-encryption''' schemes are [[cryptosystem]]s which allow third-parties (proxies) to alter a [[ciphertext]] which has been encrypted for one party, so that it may be decrypted by another. For example, Bob could designate a proxy to re-encrypt messages encrypted for him so that Charlie can decrypt them with his key. When Alice sends a message encrypted under Bob's key, the proxy alters the message and thus Charlie can decrypt it. This makes possible a number of applications, including email forwarding, law-enforcement monitoring, and content distribution. Clearly a naive proxy re-encryption scheme is possible if the proxy possesses both parties' keys, and simply decrypts with one to reveal a plaintext which is then encrypted with the other. However, the goal of many proxy re-encryption schemes is to avoid revealing either the keys, or the underlying plaintext to the proxy.
Line 8:
Proxy re-encryption should not be confused with [[proxy signature]]s, which is a separate construction with a different purpose.
== links ==
* [http://ieeexplore.ieee.org/search/wrapper.jsp?arnumber=1416861]
[[Category:Cryptography]]
{{crypto-stub}}
|