NuLink is a link network connecting privacy preserving applications to blockchains through Ursulas of NuCypher.

It integrates the most advanced technologies in cryptography and blockchain fields such as Proxy Re-encryption, Zero-Knowledge proof, Fully Homomorphic Encryption, Chain Interoperation, etc.

How does NuLink work

  • 1. The application layer gives the authorization to cryptograph layer to encrypt or decrypt data.
  • 2. The Ursulas nodes which can provide re-encryption service would register in Ethereum.
  • 3. The cryptograph layer uploads or downloads the encrypted data to the storage layer.
  • 4. The watcher network would relay the information of Ursulas nodes from Ethereum to the blockchain system such as Solana or Polkadot. The blockchain network would handle the Policy management upon request.

Technical Features

  • 1.Proxy Re-encryption

    Proxy re-encryption (PRE) is a type of public-key encryption (PKE) that allows a third party to transform ciphertext under one public key to another, without leaking any information.

  • 2.Decentralized storage

    Distributed storage is a storage method based on P2P network. It uses cryptography technologies such as hash,which make it has advantages in file retrieval and file transfer.

  • 3. Blockchain Interoperation

    Blockchain interoperation is the technology that allows two or more different block chain systems can read, write and transmit information to each other.

Future Support

  • 1.Zero Knowledge Proof

    Zero knowledge proof (ZKP) is a proof mechanism does not reveal privacy. The prover makes the verifier believe a certain conclusion without providing useful knowledge.

  • 2.Secure Multi-party Computation

    Secure multi-party computation (MPC) is a computing method of multi-party cooperation. It means that multiple participants who hold private data jointly calculate a certain agreed function, and obtain the results safely.

  • 3.Identity-Based Encryption

    Identity-based encryption (IBE) uses user's identity as a part of key, the sender can transfer a message that can only be decrypted by the recipient of the specified identity.

  • 4.Attribute-Based Encryption

    Attribute-based encryption (ABE) uses user's attribute set as a part of key, which can restrict user's ability to access and decrypt the ciphertext.

Application Senarios

  • 1. Electronic Health Records Sharing

  • 2. Private-Preserving Social Network

  • 3. Decentralized digital rights management

  • 4. Encrypted NFT