Strategy overview
The vault-name and password entered by the user are the starting point of all encryption, abbreviated as inputs;
The address of the user contract storage space is derived based on the inputs;
The key to encrypt the Label is derived based on the inputs. The encryption of the label adopts the backward ratchet strategy, and the previous label will be part of the key derivation parameters of the latter label;
The key to encrypt Content is based on inputs and labels, and a similar backward ratchet key push strategy based on labels will be used during this period;
The user's permission to operate the storage contract is based on the signature; the verification key pair of the signature is derived based on the inputs;
Last updated