mirror of https://github.com/nucypher/nucypher.git
parent
ce15ffcd02
commit
daa6693306
|
@ -49,8 +49,8 @@ policy in the NuCypher Network to grant access to him. To grant access to Bob, A
|
||||||
|
|
||||||
.. note::
|
.. note::
|
||||||
|
|
||||||
Even though Bob can decrypt the encrypted treasure map, since each re-encryption fragment is encrypted
|
Bob can decrypt the encrypted treasure map, but since each re-encryption fragment is encrypted
|
||||||
for a specific Ursula, Bob never has access to the plaintext re-encryption fragment.
|
for a specific Ursula, Bob never has access to any re-encryption fragment in plaintext form.
|
||||||
|
|
||||||
|
|
||||||
Enrico::Encrypt
|
Enrico::Encrypt
|
||||||
|
|
|
@ -26,8 +26,7 @@ with the policy, which are nodes on the NuCypher network. Each Ursula provides t
|
||||||
``n`` re-encryption key shares (:term:`kFrag`), each of which is encrypted with a different Ursula's encrypting key.
|
``n`` re-encryption key shares (:term:`kFrag`), each of which is encrypted with a different Ursula's encrypting key.
|
||||||
The Ursulas in the group stand ready to re-encrypt data in exchange for payment in fees and token rewards.
|
The Ursulas in the group stand ready to re-encrypt data in exchange for payment in fees and token rewards.
|
||||||
The list of Ursulas and their associated encrypted re-encryption key shares are stored in a treasure map. Alice
|
The list of Ursulas and their associated encrypted re-encryption key shares are stored in a treasure map. Alice
|
||||||
subsequently encrypts the treasure map for Bob. The treasure map gives Bob the requisite information for getting
|
subsequently encrypts the treasure map for Bob. The treasure map provides Bob the requisite information and cryptographic material to successfully request the NuCypher network to re-encrypt the data shared by Alice – such that he can decrypt it with his private key.
|
||||||
the shared data re-encrypted by the NuCypher Network.
|
|
||||||
|
|
||||||
3. Each policy created by Alice has an associated encryption key, which can be used
|
3. Each policy created by Alice has an associated encryption key, which can be used
|
||||||
by any entity (Enrico) to encrypt data on Alice's behalf.
|
by any entity (Enrico) to encrypt data on Alice's behalf.
|
||||||
|
@ -43,7 +42,7 @@ storage layer and sends a re-encryption request to the relevant Ursulas on the N
|
||||||
satisfied, Ursula decrypts the provided re-encryption key share and re-encrypts the data to Bob's public key. Bob
|
satisfied, Ursula decrypts the provided re-encryption key share and re-encrypts the data to Bob's public key. Bob
|
||||||
can subsequently decrypt the data with his private key.
|
can subsequently decrypt the data with his private key.
|
||||||
|
|
||||||
5. Ursulas earn fees and token rewards for performing re-encryption operations.
|
5. Ursulas earn fees and token rewards for being available to perform re-encryption operations.
|
||||||
|
|
||||||
More detailed information:
|
More detailed information:
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue