Reference to Umbral shouldn't be the first thing in the README.

pull/924/head
David Núñez 2019-04-09 11:19:37 +02:00
parent 68be09e1b2
commit a705348f8d
2 changed files with 21 additions and 7 deletions

View File

@ -12,16 +12,19 @@
----
The NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral)
threshold proxy re-encryption scheme to provide cryptographic access control
The NuCypher network facilitates end-to-end encrypted data sharing
for distributed apps and protocols.
Applications can use the NuCypher network to facilitate end-to-end encrypted
data sharing via sharing policies. Access permissions are baked into the
underlying encryption, and access can only be explicitly granted by the data owner.
Access permissions are baked into the underlying encryption,
and access can only be explicitly granted by the data owner via sharing policies.
Consequently, the data owner has ultimate control over access to their data.
At no point is the data decrypted nor can the underlying private keys be
determined by the NuCypher network.
Under the hood, the NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral)
threshold proxy re-encryption scheme to provide cryptographic access control.
# How does NuCypher work?
01. Alice, the data owner, grants access to her encrypted data to
anyone she wants by creating a policy and uploading it to
the NuCypher network.

View File

@ -31,8 +31,19 @@ NuCypher
.. _Umbral: https://github.com/nucypher/pyUmbral
The NuCypher network uses the Umbral_ threshold proxy re-encryption scheme
to provide cryptographic access controls for distributed apps and protocols.
The NuCypher network facilitates end-to-end encrypted data sharing
for distributed apps and protocols.
Access permissions are baked into the underlying encryption,
and access can only be explicitly granted by the data owner via sharing policies.
Consequently, the data owner has ultimate control over access to their data.
At no point is the data decrypted nor can the underlying private keys be
determined by the NuCypher network.
Under the hood, the NuCypher network uses the Umbral_
threshold proxy re-encryption scheme to provide cryptographic access control.
How does NuCypher work?
-----------------------
1. Alice, the data owner, grants access to her encrypted data to
anyone she wants by creating a policy and uploading it to