mirror of https://github.com/nucypher/nucypher.git
Reference to Umbral shouldn't be the first thing in the README.
parent
68be09e1b2
commit
a705348f8d
13
README.md
13
README.md
|
@ -12,16 +12,19 @@
|
|||
|
||||
----
|
||||
|
||||
The NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral)
|
||||
threshold proxy re-encryption scheme to provide cryptographic access control
|
||||
The NuCypher network facilitates end-to-end encrypted data sharing
|
||||
for distributed apps and protocols.
|
||||
Applications can use the NuCypher network to facilitate end-to-end encrypted
|
||||
data sharing via sharing policies. Access permissions are baked into the
|
||||
underlying encryption, and access can only be explicitly granted by the data owner.
|
||||
Access permissions are baked into the underlying encryption,
|
||||
and access can only be explicitly granted by the data owner via sharing policies.
|
||||
Consequently, the data owner has ultimate control over access to their data.
|
||||
At no point is the data decrypted nor can the underlying private keys be
|
||||
determined by the NuCypher network.
|
||||
|
||||
Under the hood, the NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral)
|
||||
threshold proxy re-encryption scheme to provide cryptographic access control.
|
||||
|
||||
# How does NuCypher work?
|
||||
|
||||
01. Alice, the data owner, grants access to her encrypted data to
|
||||
anyone she wants by creating a policy and uploading it to
|
||||
the NuCypher network.
|
||||
|
|
|
@ -31,8 +31,19 @@ NuCypher
|
|||
|
||||
.. _Umbral: https://github.com/nucypher/pyUmbral
|
||||
|
||||
The NuCypher network uses the Umbral_ threshold proxy re-encryption scheme
|
||||
to provide cryptographic access controls for distributed apps and protocols.
|
||||
The NuCypher network facilitates end-to-end encrypted data sharing
|
||||
for distributed apps and protocols.
|
||||
Access permissions are baked into the underlying encryption,
|
||||
and access can only be explicitly granted by the data owner via sharing policies.
|
||||
Consequently, the data owner has ultimate control over access to their data.
|
||||
At no point is the data decrypted nor can the underlying private keys be
|
||||
determined by the NuCypher network.
|
||||
|
||||
Under the hood, the NuCypher network uses the Umbral_
|
||||
threshold proxy re-encryption scheme to provide cryptographic access control.
|
||||
|
||||
How does NuCypher work?
|
||||
-----------------------
|
||||
|
||||
1. Alice, the data owner, grants access to her encrypted data to
|
||||
anyone she wants by creating a policy and uploading it to
|
||||
|
|
Loading…
Reference in New Issue