mirror of https://github.com/nucypher/nucypher.git
Merge pull request #924 from cygnusv/readme
Updates README: Slight touch to first paragraph. Codecov badgepull/944/head
commit
2f81e61ca1
17
README.md
17
README.md
|
@ -4,24 +4,27 @@
|
|||
|
||||
[](https://pypi.org/project/nucypher/)
|
||||
[](https://pypi.org/project/nucypher/)
|
||||
[](https://coveralls.io/github/nucypher/nucypher?branch=master)
|
||||
[](https://codecov.io/gh/nucypher/nucypher)
|
||||
[](https://circleci.com/gh/nucypher/nucypher/tree/master)
|
||||
[](https://discord.gg/7rmXa3S)
|
||||
[](https://discord.gg/7rmXa3S)
|
||||
[](https://nucypher.readthedocs.io/en/latest/)
|
||||
[](https://www.gnu.org/licenses/gpl-3.0.html)
|
||||
|
||||
----
|
||||
|
||||
The NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral)
|
||||
threshold proxy re-encryption scheme to provide cryptographic access control
|
||||
The NuCypher network facilitates end-to-end encrypted data sharing
|
||||
for distributed apps and protocols.
|
||||
Applications can use the NuCypher network to facilitate end-to-end encrypted
|
||||
data sharing via sharing policies. Access permissions are baked into the
|
||||
underlying encryption, and access can only be explicitly granted by the data owner.
|
||||
Access permissions are baked into the underlying encryption,
|
||||
and access can only be explicitly granted by the data owner via sharing policies.
|
||||
Consequently, the data owner has ultimate control over access to their data.
|
||||
At no point is the data decrypted nor can the underlying private keys be
|
||||
determined by the NuCypher network.
|
||||
|
||||
Under the hood, the NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral)
|
||||
threshold proxy re-encryption scheme to provide cryptographic access control.
|
||||
|
||||
# How does NuCypher work?
|
||||
|
||||
01. Alice, the data owner, grants access to her encrypted data to
|
||||
anyone she wants by creating a policy and uploading it to
|
||||
the NuCypher network.
|
||||
|
|
|
@ -15,8 +15,8 @@ NuCypher
|
|||
:target: https://circleci.com/gh/nucypher/nucypher/tree/master
|
||||
:alt: CircleCI build status
|
||||
|
||||
.. image:: https://coveralls.io/repos/github/nucypher/nucypher/badge.svg?branch=master
|
||||
:target: https://coveralls.io/github/nucypher/nucypher?branch=master
|
||||
.. image:: https://codecov.io/gh/nucypher/nucypher/branch/master/graph/badge.svg
|
||||
:target: https://codecov.io/gh/nucypher/nucypher
|
||||
|
||||
.. image:: https://img.shields.io/discord/411401661714792449.svg?logo=discord
|
||||
:target: https://discord.gg/7rmXa3S
|
||||
|
@ -31,8 +31,19 @@ NuCypher
|
|||
|
||||
.. _Umbral: https://github.com/nucypher/pyUmbral
|
||||
|
||||
The NuCypher network uses the Umbral_ threshold proxy re-encryption scheme
|
||||
to provide cryptographic access controls for distributed apps and protocols.
|
||||
The NuCypher network facilitates end-to-end encrypted data sharing
|
||||
for distributed apps and protocols.
|
||||
Access permissions are baked into the underlying encryption,
|
||||
and access can only be explicitly granted by the data owner via sharing policies.
|
||||
Consequently, the data owner has ultimate control over access to their data.
|
||||
At no point is the data decrypted nor can the underlying private keys be
|
||||
determined by the NuCypher network.
|
||||
|
||||
Under the hood, the NuCypher network uses the Umbral_
|
||||
threshold proxy re-encryption scheme to provide cryptographic access control.
|
||||
|
||||
How does NuCypher work?
|
||||
-----------------------
|
||||
|
||||
1. Alice, the data owner, grants access to her encrypted data to
|
||||
anyone she wants by creating a policy and uploading it to
|
||||
|
|
Loading…
Reference in New Issue