I am trying to do the following:
1- Built Object O includes encrypted data (encrypted by Key1) by using class A.
2- Send the Key 1 to Middle Class M.
3- Send the object to Class B.
4- Class B send request to Class M to get the Key1.
5- Class B receive Key 1 from Class M.
6- Class B encrypt the Object O and execute it.
Q: can I simulate above steps using Java security?