Data Privacy with the NuCypher Network
The NuCypher network uses the Umbral threshold proxy re-encryption scheme to provide cryptographic access controls for distributed apps and protocols.
This article is adapted from the NuCypher documentation
Overview
-
Alice, the data owner, grants access to her encrypted data to anyone she wants by creating a policy and uploading it to the NuCypher network.
-
Using her policy’s public key, any entity can encrypt data on Alice’s behalf. This entity could be an IoT device in her car, a collaborator assigned the task of writing data to her policy, or even a third-party creating data that belongs to her – for example, a lab analyzing medical tests. The resulting encrypted data can be uploaded to IPFS, Swarm, S3, or any other storage layer.
-
A group of Ursulas, which are nodes of the NuCypher network, receive the access policy and stand ready to re-encrypt data in exchange for payment in fees and token rewards. Thanks to the use of proxy re-encryption, Ursulas and the storage layer never have access to Alice’s plaintext data.
-
Bob, a data recipient, sends an access request to the NuCypher network. If the policy is satisfied, the data is re-encrypted to his public key and he can decrypt it with his private key.
More detailed information about the NuCypher network can be found here:
Read the NuCypher whitepapers
Network
https://github.com/nucypher/whitepaper/blob/master/whitepaper.pdf
“NuCypher - A proxy re-encryption network to empower privacy in decentralized systems” by Michael Egorov, David Nuñez, and MacLane Wilkison - NuCypher
Economics
https://github.com/nucypher/mining-paper/blob/master/mining-paper.pdf
“NuCypher - Mining & Staking Economics” by Michael Egorov, MacLane Wilkison - NuCypher
Cryptography
https://github.com/nucypher/umbral-doc/blob/master/umbral-doc.pdf
“Umbral A Threshold Proxy Re-Encryption Scheme” by David Nuñez - NuCypher
Guides
- Nucypher Quickstart
- NuCypher Federated Testnet (NuFT) Setup Guide
- Installation Guide
- Ursula Configuration Guide
- Contributing
- NuCypher Character Control Guide
- NuCypher Staking Guide
- Deployment Guide
Demos
- Kauri original title: Data Privacy with the NuCypher Network
- Kauri original link: https://kauri.io/data-privacy-with-the-nucypher-network/3a264ce066b04332b2e03ffa88af39e6/a
- Kauri original author: Kauri Team (@kauri)
- Kauri original Publication date: 2019-06-06
- Kauri original tags: encryption, nucypher, privacy, proxy-re-encryption
- Kauri original hash: QmTgEALiSyjafEdQ5FLzqqiZUuKWrXBJmnqoAqdPbiigVU
- Kauri original checkpoint: QmUP9qZg9vxiTYmDyCRfVzpyYLQbtd6r3GAM7CyqCFhShv