mirror of https://github.com/nucypher/nucypher.git
Update README/comments to no longer reference the legacy NuCypher Network.
parent
52341f2e3d
commit
99d2bd86ae
|
@ -95,7 +95,7 @@ alicia = Alice(
|
|||
# Alice puts her public key somewhere for Bob to find later...
|
||||
alice_verifying_key = alicia.stamp.as_umbral_pubkey()
|
||||
|
||||
# Let's get to learn about the NuCypher network
|
||||
# Let's get to learn about the TACo nodes on the Threshold Network
|
||||
alicia.start_learning_loop(now=True)
|
||||
|
||||
# At this point, Alicia is fully operational and can create policies.
|
||||
|
@ -147,7 +147,7 @@ threshold, shares = 2, 3
|
|||
|
||||
|
||||
# With this information, Alicia creates a policy granting access to Bob.
|
||||
# The policy is sent to the NuCypher network.
|
||||
# The policy is sent to the TACo Application on the Threshold Network.
|
||||
print("Creating access policy for the Doctor...")
|
||||
policy = alicia.grant(bob=doctor_strange,
|
||||
label=label,
|
||||
|
|
|
@ -70,7 +70,8 @@ treasure_map = EncryptedTreasureMap.from_bytes(base64.b64decode(policy_data["tre
|
|||
data = msgpack.load(open("heart_data.msgpack", "rb"), raw=False)
|
||||
message_kits = (MessageKit.from_bytes(k) for k in data['kits'])
|
||||
|
||||
# Now he can ask the NuCypher network to get a re-encrypted version of each MessageKit.
|
||||
# Now he can ask the TACo nodes on the Threshold Network
|
||||
# to get a re-encrypted version of each MessageKit.
|
||||
for message_kit in message_kits:
|
||||
start = timer()
|
||||
retrieved_plaintexts = doctor.retrieve_and_decrypt(
|
||||
|
|
|
@ -1,27 +1,27 @@
|
|||
# NuCypher's Heartbeat Demo
|
||||
# NuCypher's PRE Heartbeat Demo
|
||||
|
||||

|
||||
|
||||
Alicia has a Heart Monitor device that measures her heart rate and outputs this data in encrypted form.
|
||||
Since she thinks that she may want to share this data in the future,
|
||||
she uses NuCypher to create a _policy public key_ for the Heart Monitor to use,
|
||||
she uses TACo's proxy re-encryption (PRE) on the Threshold Network to create a _policy public key_ for the Heart Monitor to use,
|
||||
so she can read and delegate access to the encrypted data as she sees fit.
|
||||
The Heart Monitor uses this public key to produce a file with some amount of encrypted heart rate measurements;
|
||||
this file is uploaded to some storage service (e.g., IPFS, S3, whatever).
|
||||
|
||||
At some moment, she wants to share this information with other people, such as her Doctor.
|
||||
Once she obtains her Doctor's public keys, she can create a policy in the NuCypher network granting access to him.
|
||||
Once she obtains her Doctor's public keys, she can create a policy in the TACo Application on the Threshold Network granting access to him.
|
||||
After this, her Doctor can read the file with encrypted data (which was uploaded by the Heart Monitor)
|
||||
and request a re-encrypted ciphertext for each measurement, which can be opened with the Doctor's private key.
|
||||
|
||||
This simple use case showcases many interesting and distinctive aspects of NuCypher:
|
||||
This simple use case showcases many interesting and distinctive aspects of TACo:
|
||||
- Alicia can create policy public keys **before knowing** who will be the potential consumers.
|
||||
- Alicia, or anyone knowing the policy public key (e.g., the Heart Monitor),
|
||||
can produce encrypted data that belongs to the policy. Again, this can happen before granting access to any consumer.
|
||||
- As a consequence of the previous point, Data Sources, like the Heart Monitor,
|
||||
are completely unaware of the recipients. In their mind, they are producing data **for Alicia**.
|
||||
- Alicia never interacts with the Doctor: she only needs the Doctor's public key.
|
||||
- Alicia only interacts with the NuCypher network for granting access to the Doctor.
|
||||
- Alicia only interacts with the Threshold Network for granting access to the Doctor.
|
||||
After this, she can even disappear from the face of the Earth.
|
||||
- The Doctor never interacts with Alicia or the Heart Monitor:
|
||||
he only needs the encrypted data and some policy metadata.
|
||||
|
@ -65,8 +65,8 @@ What's left is running the `doctor.py` script:
|
|||
```sh
|
||||
(nucypher)$ python doctor.py
|
||||
```
|
||||
This script will read the data generated in the previous step and retrieve re-encrypted ciphertexts via the NuCypher
|
||||
network. The result is printed in the console:
|
||||
This script will read the data generated in the previous step and retrieve re-encrypted ciphertexts via the TACo on the
|
||||
Threshold Network . The result is printed in the console:
|
||||
|
||||
```
|
||||
Creating the Doctor ...
|
||||
|
|
Loading…
Reference in New Issue