The privacy layer of the decentralized internet.
How it works
01.Alice has sensitive data that she wants to be able to delegate access to.
02.Alice encrypts her data using her own public key and stores it in the cloud, or decentralized storage.
03.Alice delegates access to Bob. The data is rekeyed to Bob's key in storage.
04.Bob downloads the data and decrypts it with his private key.
Proxy Re-encryption (PRE)
NuCypher's PRE network provides cryptographic access controls for developers managing private data on public blockchains.
Fully Homomorphic Encryption (FHE)
NuCypher's FHE library enables secure processing and computing on encrypted data by outsourced nodes.