Systems and techniques to enable secure and efficient recovery of
encrypted content may include accessing a public key of a user and
another user and encrypting data using the public keys. The another user
may be the user's manager. Systems and techniques may include generating
a session key, encrypting data using the session key, and encrypting the
session key using the public keys of at least two users. A data structure
such as a directory may be accessed to obtain information such as one or
more public keys.