“The Data Owner” Character - retains full control over the data encrypted for her and determines whom to share the data with.
Encrypted symmetric key (KEM) that is eventually re-encrypted.
A common term for any entity fulfilling a particular role in our cryptographic narrative.
Data encapsulation mechanism - data encrypted with a symmetric key.
Key encapsulation mechanism - a symmetric key encrypted with an asymmetric key
A fragment of a Re-encryption Key.
A title for a classification/categorization of data according to how it is intended to be shared.
The ciphertext (data encrypted with a symmetric key) and the Capsule (encrypted symmetric key) that are stored together.
The Legacy NuCypher token used by nodes for staking.
1 NU = 1018 NuNits.
A web service that is the conduit between applications (platform-agnostic) and the PRE nodes on the Threshold network, that performs
nucypherprotocol operations on behalf of Alice and Bob.
- Re-encryption Key
A key that facilitates the transformation of ciphertext from one encryption key to another.
The public key for a Character’s signing key pair.
- Treasure Map
“The Proxy in PRE” Character - the PRE node on the Threshold Network that stands ready to re-encrypt data in exchange for payment in fees and token rewards; they enforce the access policy created by Alice.
An account that is actively doing work in the network as an Ursula node. An Operator is bonded to, and performs work on behalf of, a Staking Provider.