Add to docs too

pull/1226/head
MacLane Wilkison 2019-09-02 18:05:45 -07:00
parent 7e3e0a7e3c
commit f293251b78
2 changed files with 10 additions and 5 deletions

View File

@ -1,7 +1,6 @@
![](/docs/source/.static/img/nucypher.png) ![](/docs/source/.static/img/nucypher.png)
*A decentralized cryptological network offering accessible, intuitive, and extensible runtimes *A decentralized cryptological network offering accessible, intuitive, and extensible runtimes and interfaces for secrets management, secure data exchange, and secure computation.*
and interfaces for secrets management, secure data exchange, and secure computation.*
[![pypi](https://img.shields.io/pypi/v/nucypher.svg?style=flat)](https://pypi.org/project/nucypher/) [![pypi](https://img.shields.io/pypi/v/nucypher.svg?style=flat)](https://pypi.org/project/nucypher/)
[![pyversions](https://img.shields.io/pypi/pyversions/nucypher.svg)](https://pypi.org/project/nucypher/) [![pyversions](https://img.shields.io/pypi/pyversions/nucypher.svg)](https://pypi.org/project/nucypher/)

View File

@ -1,6 +1,6 @@
NuCypher NuCypher
======== ========
*A decentralized cryptological network offering accessible, intuitive, and collusion-resistant runtimes and interfaces to novel and exciting cryptographic primitives.* *A decentralized cryptological network offering accessible, intuitive, and extensible runtimes and interfaces for secrets management, secure data exchange, and secure computation.*
---- ----
@ -31,8 +31,14 @@ NuCypher
.. _Umbral: https://github.com/nucypher/pyUmbral .. _Umbral: https://github.com/nucypher/pyUmbral
The NuCypher network facilitates end-to-end encrypted data sharing The NuCypher network provides accessible, intuitive, and extensible runtimes and interfaces for secrets management, secure data exchange, and secure computation.
for distributed apps and protocols. * Accessible - The network is permissionless and censorship-resistant.
There are no gate-keepers and anyone can use it.
* Intuitive - The network leverages the classic cryptological narrative of Alice and Bob
(with additional characters where appropriate). This character-based narrative permeates the code-base and helps
developers write safe, misuse-resistant code.
* Extensible - The network currently supports proxy re-encryption but can be extended to provide support other cryptographic primitives.
Access permissions are baked into the underlying encryption, Access permissions are baked into the underlying encryption,
and access can only be explicitly granted by the data owner via sharing policies. and access can only be explicitly granted by the data owner via sharing policies.
Consequently, the data owner has ultimate control over access to their data. Consequently, the data owner has ultimate control over access to their data.