mirror of https://github.com/nucypher/nucypher.git
Add links to glossary for new terms in Introduction
parent
f9e1b38ce4
commit
9d766cbf55
|
@ -62,13 +62,12 @@ How does it Work?
|
|||
anyone she wants by creating a policy and uploading it to
|
||||
the PRE Application on the Threshold Network.
|
||||
|
||||
2. Alice gets information about the group of ``n`` PRE nodes (Ursulas) associated
|
||||
with the policy, which are nodes on the Threshold network providing the PRE service. Each Ursula provides their encrypting key, and Alice creates
|
||||
2. Alice gets information about the group of ``n`` Ursulas associated
|
||||
with the policy, which are nodes on the NuCypher network. Each :term:`Ursula`` provides their encrypting key, and Alice creates
|
||||
``n`` re-encryption key shares (:term:`kFrag`), each of which is encrypted with a different Ursula's encrypting key.
|
||||
The Ursulas in the group stand ready to re-encrypt data in exchange for payment in fees and token rewards.
|
||||
The list of Ursulas and their associated encrypted re-encryption key shares are stored in a treasure map. Alice
|
||||
subsequently encrypts the treasure map for Bob. The treasure map provides Bob the requisite information and cryptographic
|
||||
material to successfully request the Threshold Network to re-encrypt the data shared by Alice – such that he can decrypt it with his private key.
|
||||
The list of Ursulas and their associated encrypted re-encryption key shares are stored in a :term:`Treasure Map`. Alice
|
||||
subsequently encrypts the treasure map for Bob. The treasure map provides Bob the requisite information and cryptographic material to successfully request the NuCypher network to re-encrypt the data shared by Alice – such that he can decrypt it with his private key.
|
||||
|
||||
3. Each policy created by Alice has an associated encryption key, which can be used
|
||||
by any entity (Enrico) to encrypt data on Alice's behalf.
|
||||
|
|
Loading…
Reference in New Issue