Abstract
In this article, we point out that in general, newly-designed highly functional cryptographic tools have significantly complicated structures that hinder user understanding. Furthermore, this fact may prevent these new technologies from being introduced into real world systems. We propose a new methodology for overcoming this barrier. We take proxy re-encryption as an example, and discuss how the barrier to user understanding is reduced by our proposed methodology.