A method including decrypting, by a user device based at least in part on utilizing a first trusted key generated by a trusted device, an assigned private key associated with the user device; decrypting, by the user device based at least in part on utilizing a second trusted key generated by the trusted device, a double-encrypted symmetric key to determine a single-encrypted symmetric key; decrypting, by the user device based at least in part on utilizing the assigned private key, the single-encrypted symmetric key to determine a symmetric key; and decrypting, by the user device based at least in part on utilizing the symmetric key, an encrypted folder stored on the user device to provide access to data included in the encrypted folder. Various other aspects and techniques are contemplated.