Add links to glossary for new terms in Introduction

pull/2888/head
James Campbell 2022-03-21 15:04:46 -05:00 committed by Kieran Prasch
parent f9e1b38ce4
commit 9d766cbf55
1 changed files with 4 additions and 5 deletions

View File

@ -62,13 +62,12 @@ How does it Work?
anyone she wants by creating a policy and uploading it to anyone she wants by creating a policy and uploading it to
the PRE Application on the Threshold Network. the PRE Application on the Threshold Network.
2. Alice gets information about the group of ``n`` PRE nodes (Ursulas) associated 2. Alice gets information about the group of ``n`` Ursulas associated
with the policy, which are nodes on the Threshold network providing the PRE service. Each Ursula provides their encrypting key, and Alice creates with the policy, which are nodes on the NuCypher network. Each :term:`Ursula`` provides their encrypting key, and Alice creates
``n`` re-encryption key shares (:term:`kFrag`), each of which is encrypted with a different Ursula's encrypting key. ``n`` re-encryption key shares (:term:`kFrag`), each of which is encrypted with a different Ursula's encrypting key.
The Ursulas in the group stand ready to re-encrypt data in exchange for payment in fees and token rewards. The Ursulas in the group stand ready to re-encrypt data in exchange for payment in fees and token rewards.
The list of Ursulas and their associated encrypted re-encryption key shares are stored in a treasure map. Alice The list of Ursulas and their associated encrypted re-encryption key shares are stored in a :term:`Treasure Map`. Alice
subsequently encrypts the treasure map for Bob. The treasure map provides Bob the requisite information and cryptographic subsequently encrypts the treasure map for Bob. The treasure map provides Bob the requisite information and cryptographic material to successfully request the NuCypher network to re-encrypt the data shared by Alice such that he can decrypt it with his private key.
material to successfully request the Threshold Network to re-encrypt the data shared by Alice such that he can decrypt it with his private key.
3. Each policy created by Alice has an associated encryption key, which can be used 3. Each policy created by Alice has an associated encryption key, which can be used
by any entity (Enrico) to encrypt data on Alice's behalf. by any entity (Enrico) to encrypt data on Alice's behalf.