I re-read the paper, and they seem to be doing what you describe. The list of H(chunk) is called "Chunk Map", and local password is called "dedicated map key"...
.. but after that they get into another round of encryption with the users public key - that's where I get lost.
.. but after that they get into another round of encryption with the users public key - that's where I get lost.