Keypoints

  1. In order not to maintain multiple keys for encryption, each bucket has a secret key (SKB)

  2. Contributors generate a unique, per-message CEK in order to encrypt a message

  3. PKB is used by the contributors to encrypt CEK to generate CEK*

  4. SKB is used by the readers to decrypt CEK*

Last updated