# Sentinel Protocol Demo This project demonstrates the core concepts of the **Sentinel Protocol**, a key management and secure data storage solution. It showcases advanced cryptographic techniques for key sharding, data encryption, and restoration under various scenarios (e.g., standard access, inheritance). ## Key Features Based on the `main_demo.py` workflow: 1. **Key Sharding (Initialization)** - Generation of mnemonic phrases (BIP-39). - Splitting secrets using Shamir's Secret Sharing (SSS) into multiple shares (Device, Cloud, Physical). 2. **Vault Layer (User Encryption)** - Derives AES keys from the master secret. - Encrypts user privacy data securely. 3. **Gateway Layer (System Wrapping)** - Adds a layer of system-level encryption using RSA. - Simulates "double wrapping" for enhanced security and access control. 4. **Trigger/Unlock Mechanism** - Demonstrates how system-level triggers (e.g., death confirmation, subscription lapse) can decrypt the outer layer. 5. **Restoration Scenarios** - **Life Access**: Recovering data using Device + Cloud shares. - **Inheritance**: Recovering data using Cloud + Physical shares (simulating beneficiary access). - **Verification**: Recovering data using Device + Physical shares. ## Documentation For detailed documentation, please refer to the language-specific guides: - **中文文档 (Chinese Documentation)**: [cn/README.md](cn/README.md) - **English Documentation**: [en/README.md](en/README.md) ## protocol_whitepaper - **Protocol Whitepaper**: [doc/protocol_whitepaper.md](doc/protocol_whitepaper.md) ## Quick Start Run the main demo script to see the full data flow in action: ```bash python3 main_demo.py ```