mirror of https://github.com/nucypher/nucypher.git
Updated readme to be in line with the docs - included overview image.
parent
4f8ae17049
commit
083b2bdcaa
27
README.md
27
README.md
|
@ -1,4 +1,4 @@
|
|||

|
||||

|
||||
|
||||
*A decentralized cryptological network offering accessible, intuitive, and extensible runtimes and interfaces for secrets management and dynamic access control.*
|
||||
|
||||
|
@ -32,27 +32,32 @@ threshold proxy re-encryption scheme to provide cryptographic access control.
|
|||
|
||||
# How does NuCypher work?
|
||||
|
||||

|
||||
|
||||
01. Alice, the data owner, grants access to her encrypted data to
|
||||
anyone she wants by creating a policy and uploading it to
|
||||
the NuCypher network.
|
||||
|
||||
02. Using her policy's public key, any entity can encrypt data on Alice's behalf.
|
||||
02. A group of Ursulas, which are nodes on the NuCypher network,
|
||||
receive information about the policy, called a PolicyArrangement that include
|
||||
a re-encryption key share. The Ursulas stand ready to re-encrypt data in exchange for payment
|
||||
in fees and token rewards. Thanks to the use of proxy re-encryption,
|
||||
Ursulas and the storage layer never have access to Alice's plaintext data.
|
||||
|
||||
03. Each policy created by Alice has an associated encryption key, which can be used
|
||||
by any entity (Enrico) to encrypt data on Alice's behalf.
|
||||
This entity could be an IoT device in her car, a collaborator assigned
|
||||
the task of writing data to her policy, or even a third-party creating
|
||||
data that belongs to her – for example, a lab analyzing medical tests.
|
||||
The resulting encrypted data can be uploaded to IPFS, Swarm, S3,
|
||||
or any other storage layer.
|
||||
|
||||
03. A group of Ursulas, which are nodes of the NuCypher network,
|
||||
receive the access policy and stand ready to
|
||||
re-encrypt data in exchange for payment in fees and token rewards.
|
||||
Thanks to the use of proxy re-encryption,
|
||||
Ursulas and the storage layer never have access to Alice's plaintext data.
|
||||
04. Bob, a data recipient, obtains the encrypted data from the storage layer and sends an access request
|
||||
to the NuCypher network. If the policy is satisfied, the data is re-encrypted to his public key
|
||||
and he can decrypt it with his private key.
|
||||
|
||||
04. Bob, a data recipient, sends an access request to the NuCypher network.
|
||||
If Bob was granted an access policy by Alice,
|
||||
the data is re-encrypted for his public key,
|
||||
and he can subsequently decrypt it with his private key.
|
||||
05. Ursulas earn fees and token rewards for performing
|
||||
re-encryption operations.
|
||||
|
||||
More detailed information:
|
||||
|
||||
|
|
Loading…
Reference in New Issue