Tokenized Encryption Proof of Concept.

  1. Generate 1 sender and 2 receiver key pairs.
  2. Generate Master Key.
  3. Encrypt a message with the master key.
  4. Generate ECDH Keys between sender and each of the receivers.
  5. Encrypt the Master Key with each of the sender's ECDH Keys corresponding to each of the receivers.
  6. Decrypt the encrypted Master Key with each of the receiver's ECDH Keys.
  7. Decrypt the message with each of the receiver's decrypted master keys.

Initial Information
Sender Private Key
Receiver 1 Public Key
Receiver 2 Public Key
Secret Information
Master Key
Message 
Encrypted Information
IV
Message
Receiver 1
ECDH
IV
Encrypted Key
Receiver 2
ECDH
IV
Encrypted Key
Receiver 1 Information
Private Key
ECDH
Key
Message
Receiver 2 Information
Private Key
ECDH
Key
Message