kauri

2 min read - Posted 06 Jun 19

Data Privacy with the NuCypher Network

The NuCypher network uses the Umbral threshold proxy re-encryption scheme to provide cryptographic access controls for distributed apps and protocols.

This article is adapted from the NuCypher documentation

Overview

  1. Alice, the data owner, grants access to her encrypted data to anyone she wants by creating a policy and uploading it to the NuCypher network.

  2. Using her policy’s public key, any entity can encrypt data on Alice’s behalf. This entity could be an IoT device in her car, a collaborator assigned the task of writing data to her policy, or even a third-party creating data that belongs to her – for example, a lab analyzing medical tests. The resulting encrypted data can be uploaded to IPFS, Swarm, S3, or any other storage layer.

  3. A group of Ursulas, which are nodes of the NuCypher network, receive the access policy and stand ready to re-encrypt data in exchange for payment in fees and token rewards. Thanks to the use of proxy re-encryption, Ursulas and the storage layer never have access to Alice’s plaintext data.

  4. Bob, a data recipient, sends an access request to the NuCypher network. If the policy is satisfied, the data is re-encrypted to his public key and he can decrypt it with his private key.

More detailed information about the NuCypher network can be found here:

GitHub

nucypher.com

Read the NuCypher whitepapers

Network

https://github.com/nucypher/whitepaper/blob/master/whitepaper.pdf

“NuCypher - A proxy re-encryption network to empower privacy in decentralized systems” by Michael Egorov, David Nuñez, and MacLane Wilkison - NuCypher

Economics

https://github.com/nucypher/mining-paper/blob/master/mining-paper.pdf

“NuCypher - Mining & Staking Economics” by Michael Egorov, MacLane Wilkison - NuCypher

Cryptography

https://github.com/nucypher/umbral-doc/blob/master/umbral-doc.pdf

“Umbral A Threshold Proxy Re-Encryption Scheme” by David Nuñez - NuCypher

Guides

Demos

Created with Sketch.Content is"CC-BY-SA 4.0" licensed
Article On-chain
Article Author
0 Comments
Related Articles
NuCypher - PyUmbral

pyUmbral is the reference implementation of the Umbral threshold proxy re-encryption scheme. It is open-source, built with Python, and uses OpenSSL and Cryptography.io. This article is adapted from the pyUmbral documentation Using Umbral, Alice (the data owner) can delegate decryption rights to Bob for any ciphertext intended to her, through a re-encryption process performed by a set of semi-trusted proxies or Ursulas. When a threshold of these proxies participate by performing re-encryption, Bo

Kauri Team

17 Apr 19

Signing messages with Nethereum

The purpose of this article is to help .NET developers leverage Nethereum, An open source .NET integration library for blockchain. This document also exists as a Workbook , find more about workbooks installation requirements here Nethereum provides methods to sign messages in an Ethereum compatible format. The following is a quick guide to signing a string with Nethereum and verifying a signature using various methods. Ethereum signing basics In the Ethereum context, signing a message allows us

Josh Cassidy

06 Jun 19