How it works
01.Alice has sensitive data that she wants to store and share.
02.Alice encrypts her data using her public key and uploads it to storage.
03.Alice delegates access to Bob. The data is rekeyed to Bob's key using proxy re-encryption.
04.Bob downloads the data and decrypts it with his own private key.