A method and apparatus for securely communicating data employs a
third-party to facilitate decryption by the recipient. It is necessary
for the recipient to interact with the third-party to decrypt received
encrypted data. The third-party is unable to decrypt or read the
encrypted data and records whether the recipient requested a decryption
key generated by the third-party. The third party logs the request from
the second party for the decryption key. The originator may then obtain
the delivery status of the data from the third party to facilitate proof
of submission, proof of delivery, or any other suitable information.