Inspired by the principle of tor, we intend to develop a distributed data base which could maintain privacy preserving.
But I still have some questions about how does tor work, especially how does it encrypt my data?
We know that there is an entrance node and an exit node in a path, cleartext is sent out from the exit node to the destination that we are aimed at. If so, my original cleartext could be revealed to the exit node? If my data is encrypted on my PC by the tor I runned, how does the exit node decrypt the ciphered text? How does it get the decrypt key?
Another question is what kind of cryptology algorithm tor uses, RSA? or others?
Thank you very much for replying!!!