Proxy re-encryption: Difference between revisions

Content deleted Content added
Bluebot (talk | contribs)
formatting headings per the MOS
ITZoom (talk | contribs)
m Examples of Use: tag 'email forwarding'
Line 4:
 
==Examples of Use==
Bob could designate a proxy to re-encrypt one of his messages that is to be sent to Chris. This generates a new [[Key (cryptography)|key]] that Chris can use to decrypt the message. Now if Alice sends Chris a message that was encrypted under Bob's key, the proxy will alter the message, allowing Chris to decrypt it. This method allows for a number of applications such as email[[e-mail forwarding]], law-enforcement monitoring, and content distribution.
 
A weaker re-encryption scheme is one in which the proxy possesses both parties' keys simultaneously. One key decrypts a [[plaintext]], while the other encrypts it. Since the goal of many proxy re-encryption schemes is to avoid revelaing either of the keys or the underlying plaintext to the proxy, this method is not ideal.