Methods for transferring among key holders in encoding and cryptographic
systems the right to decode and decrypt messages in a way that does not explicitly
reveal decoding and decrypting keys used and the original messages. Such methods
are more secure and more efficient than typical re-encoding and re-encryption schemes,
and are useful in developing such applications as document distribution and long-term
file protection.