Privacy Infrastructure for the Decentralized Web

How it works

01.

Alice has sensitive data that she wants to store and share.

02.

Alice encrypts her data using her public key and uploads it to storage.

03.

Alice delegates access to Bob. The data is rekeyed to Bob's key using proxy re-encryption.

04.

Bob downloads the data and decrypts it with his own private key.

Proxy Re-encryption (PRE)

NuCypher's PRE network provides cryptographic access controls for distributed apps and protocols.

Fully Homomorphic Encryption (FHE)

NuCypher's NuFHE library enables secure, private computation on encrypted data by outsourced nodes.