Thanks for the article. I like the idea of the ephemeral key
sk_e. I’d like to propose the following improvement.
Bob could use
sk_e and his own private key,
sk_b to yield a re-encryption key
rk_eb, send that re-encryption key back to the proxy, and even stop caring about
sk_e. This way, the proxy will have
Often described as the holy grail of security, computing over encrypted data, or more aptly defined in the literature as secure computation, asks the question — how can we compute a function over hidden inputs? In other words, how can we process information we cannot see…