Why Use Two Keys, When You Can Have Three? Meet Transform (Proxy-) Encryption
Published in
3 min readMar 28, 2020
Now you should know that in public key encryption, that you can have a public key and a private key. Normally if Alice sends encrypted data to Bob, he will use his public key to encrypt the data (Bpub), and then Bob would use his private key (Bpriv) to decrypt it.