Skip to content

Commit efe2e76

Browse files
committed
Init encryption overview README
1 parent ccffde1 commit efe2e76

File tree

1 file changed

+34
-0
lines changed

1 file changed

+34
-0
lines changed

hacker-guides/encryption/README.md

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
<!-- omit in toc -->
2+
# Encrypting and Decrypting Data with Lit
3+
4+
Leveraging Lit's Multi-Party Computation (MPC) network, you can securely encrypt data using the network's public BLS (Boneh–Lynn–Shacham) key. The encryption process incorporates [Access Control Conditions (ACCs)](#access-control-conditions-accs) to specify who is authorized to decrypt the data. Only when a user meets these defined conditions will the Lit nodes generate their decryption shares, enabling the data to be decrypted securely and ensuring that access is granted exclusively to permitted parties.
5+
6+
<!-- omit in toc -->
7+
## Table of Contents
8+
9+
- [Prerequisites](#prerequisites)
10+
- [Relevant Terminology](#relevant-terminology)
11+
- [Access Control Conditions (ACCs)](#access-control-conditions-accs)
12+
- [Next Steps](#next-steps)
13+
14+
## Prerequisites
15+
16+
- Understanding of Lit core terminology and concepts covered in the [Getting Started](../_getting-started/README.md#core-terminology) guide.
17+
- Understanding of the [Connecting to the Lit Network](../_getting-started/connecting-to-lit/README.md) guide.
18+
- Understanding of the [Authenticating a Session](../_getting-started/authenticating-a-session/README.md) guide.
19+
20+
## Relevant Terminology
21+
22+
This section extends the [Core Terminology](../_getting-started/README.md#core-terminology) to expand on the relevant terminology for encryption.
23+
24+
### Access Control Conditions (ACCs)
25+
26+
Rules that specify who can decrypt the encrypted data. ACCs can be based on blockchain conditions like wallet balances, token ownership, or custom smart contract logic.
27+
28+
For more information on how to define and use ACCs, refer to the [Access Control Conditions](https://developer.litprotocol.com/category/advanced-topics) docs.
29+
30+
## Next Steps
31+
32+
Now that you have an overview of encrypting data with Lit, you can continue on to the encryption guides:
33+
34+
- [Encrypting a String](./encrypt-string/README.md)

0 commit comments

Comments
 (0)