Add to docs too

pull/1226/head
MacLane Wilkison 2019-09-02 18:05:45 -07:00
parent 7e3e0a7e3c
commit f293251b78
2 changed files with 10 additions and 5 deletions

View File

@ -1,7 +1,6 @@
![](/docs/source/.static/img/nucypher.png)
*A decentralized cryptological network offering accessible, intuitive, and extensible runtimes
and interfaces for secrets management, secure data exchange, and secure computation.*
*A decentralized cryptological network offering accessible, intuitive, and extensible runtimes and interfaces for secrets management, secure data exchange, and secure computation.*
[![pypi](https://img.shields.io/pypi/v/nucypher.svg?style=flat)](https://pypi.org/project/nucypher/)
[![pyversions](https://img.shields.io/pypi/pyversions/nucypher.svg)](https://pypi.org/project/nucypher/)

View File

@ -1,6 +1,6 @@
NuCypher
========
*A decentralized cryptological network offering accessible, intuitive, and collusion-resistant runtimes and interfaces to novel and exciting cryptographic primitives.*
*A decentralized cryptological network offering accessible, intuitive, and extensible runtimes and interfaces for secrets management, secure data exchange, and secure computation.*
----
@ -31,8 +31,14 @@ NuCypher
.. _Umbral: https://github.com/nucypher/pyUmbral
The NuCypher network facilitates end-to-end encrypted data sharing
for distributed apps and protocols.
The NuCypher network provides accessible, intuitive, and extensible runtimes and interfaces for secrets management, secure data exchange, and secure computation.
* Accessible - The network is permissionless and censorship-resistant.
There are no gate-keepers and anyone can use it.
* Intuitive - The network leverages the classic cryptological narrative of Alice and Bob
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
developers write safe, misuse-resistant code.
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives.
Access permissions are baked into the underlying encryption,
and access can only be explicitly granted by the data owner via sharing policies.
Consequently, the data owner has ultimate control over access to their data.