diff --git a/README.md b/README.md index 61d2af505..1e0d7075e 100644 --- a/README.md +++ b/README.md @@ -12,16 +12,19 @@ ---- -The NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral) -threshold proxy re-encryption scheme to provide cryptographic access control +The NuCypher network facilitates end-to-end encrypted data sharing for distributed apps and protocols. -Applications can use the NuCypher network to facilitate end-to-end encrypted -data sharing via sharing policies. Access permissions are baked into the -underlying encryption, and access can only be explicitly granted by the data owner. +Access permissions are baked into the underlying encryption, +and access can only be explicitly granted by the data owner via sharing policies. Consequently, the data owner has ultimate control over access to their data. At no point is the data decrypted nor can the underlying private keys be determined by the NuCypher network. +Under the hood, the NuCypher network uses the [Umbral](https://github.com/nucypher/pyUmbral) +threshold proxy re-encryption scheme to provide cryptographic access control. + +# How does NuCypher work? + 01. Alice, the data owner, grants access to her encrypted data to anyone she wants by creating a policy and uploading it to the NuCypher network. diff --git a/docs/source/index.rst b/docs/source/index.rst index 0d35da011..03831e902 100644 --- a/docs/source/index.rst +++ b/docs/source/index.rst @@ -31,8 +31,19 @@ NuCypher .. _Umbral: https://github.com/nucypher/pyUmbral -The NuCypher network uses the Umbral_ threshold proxy re-encryption scheme -to provide cryptographic access controls for distributed apps and protocols. +The NuCypher network facilitates end-to-end encrypted data sharing +for distributed apps and protocols. +Access permissions are baked into the underlying encryption, +and access can only be explicitly granted by the data owner via sharing policies. +Consequently, the data owner has ultimate control over access to their data. +At no point is the data decrypted nor can the underlying private keys be +determined by the NuCypher network. + +Under the hood, the NuCypher network uses the Umbral_ +threshold proxy re-encryption scheme to provide cryptographic access control. + +How does NuCypher work? +----------------------- 1. Alice, the data owner, grants access to her encrypted data to anyone she wants by creating a policy and uploading it to