
Proxy Re-Encryption — Allowing Alice To Share Her Protect Secret Key With Bob
Let’s say that Alice has stored an encrypted file, which uses a given key (K_A). Alice can then protect her key by encrypting the key with her public key. She can then decrypt this encrypted key with her private key (E_pk(K_A)):