Methods for transferring among key holders in encoding and cryptographic
systems the right to decode and decrypt messages in a way that does not
explicitly reveal decoding and decrypting keys used and the original
messages. Such methods are more secure and more efficient than typical
re-encoding and re-encryption schemes, and are useful in developing such
applications as document distribution and long-term file protection.