Files
crypto_core_demo/en/data_flow.md

3.7 KiB

Sentinel Protocol Demo Data Flow Overview

1. Key Sharding Flow: Fragmentation of Identity (Initialization)

This is the starting point of the system. Through the SSS (3,2) threshold algorithm, the user's absolute control is transformed into distributed trust.

  • Input: System randomly generates 12 BIP-39 standard mnemonic words.
  • Action: Split the Entropy corresponding to the mnemonic words into 3 independent mathematical shares:
    • Share A (Device): Presumed to be stored in the user's mobile phone security chip.
    • Share B (Cloud): Presumed to be stored on the Sentinel server.
    • Share C (Physical): Presumed to be printed on a physical inheritance card and given to the heir.
  • Verification Point: Demonstrate that the original 12 mnemonic words can be reconstructed through any of the three combinations (A+B), (B+C), (A+C).

2. User Inner Encryption Flow: Establishing a Private Vault (Vault Layer)

This is client-side encryption, ensuring "Zero-Knowledge" storage, meaning the system cannot perceive the data content without the shares.

  • Input: User private data (plaintext) + Mnemonic words recovered in Step 1.
  • Action:
    • Derive a symmetric encryption key (AES-256-GCM) from the mnemonic words.
    • Use this key to encrypt the data, generating Ciphertext 1.
  • Feature: This step simulates completion on the user's local device; Ciphertext 1 is the primary protection form of user assets.

3. System Outer Wrapping Flow: Double Encapsulation (Gateway Layer)

This is the company/platform layer encryption, used to implement "Passive Verification" and "Permission Locking".

  • Input: Ciphertext 1 + Company generated independent RSA Public Key.

  • Action:

    • The system generates a set of RSA public/private key pairs (Company Keys) unrelated to the user.
    • Use the RSA Public Key to re-encrypt Ciphertext 1, generating Ciphertext 2.
  • Logical Value: The generated Ciphertext 2 now has double security—even if the mnemonic is leaked, it cannot be opened without the company private key; even if the company private key is leaked, it cannot be opened without the mnemonic shares.

4. Decision Trigger Flow: Stripping the System Shell (Trigger/Unlock Layer)

This is the turning point of the Demo, simulating the system releasing the first layer of lock when "subscription fails" or during "normal access while alive".

  • Input: Ciphertext 2 + Company RSA Private Key.
  • Action: Use the private key to decrypt Ciphertext 2, restoring it to Ciphertext 1.
  • Business Mapping:
    • Alive Mode: User is active, system private key cooperates in real-time, allowing data to flow to the user.
    • Inheritance Mode: After death is confirmed, the system permanently releases this private key permission to the data packet.

5. Multi-Scenario Restoration Flow: Final Extraction (Restoration Scenarios)

This is the end of the Demo, showing how data eventually returns to human hands in different social scenarios.

  • Input: Ciphertext 1 restored in Step 4 + Different combinations of shares.
  • Scenario Simulation:
    • Scenario 1: Normal access while alive
      • Combination: Share A (Phone) + Share B (Cloud) --> Recover Mnemonic --> Decrypt Ciphertext 1.
      • Significance: Proves that the user can view data without the inheritance card while alive.
    • Scenario 2: Standard inheritance after death
      • Combination: Share B (Cloud) + Share C (Physical Card) ---> Recover Mnemonic ---> Decrypt Ciphertext 1.
      • Significance: Simulates the user passing away, and the heir completing the handover relying on the card and the share released by the server.
    • Scenario 3: Pure testing verification, since the user holds all 12 mnemonic words
      • Combination: Share A (Phone) + Share C (Physical Card) --> Recover Mnemonic --> Decrypt Ciphertext 1.
      • Significance: Testing purposes.