It basically allows some untrusted party to convert ciphertext which you can decrypt to a ciphertext which someone you granted access to can decrypt.
It's like "instead of decrypting my data and encrypting with Bob's public key I want Charlie to do this operation without showing my secrets to Charlie". Charlie is a miner in our case :-)