Ahmad1234567 / provable-data-possession
Automatically exported from code.google.com/p/provable-data-possession
☆14Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for provable-data-possession
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆48Updated 8 months ago
- ☆13Updated 3 years ago
- Secure Aggregation for FL☆34Updated last year
- ☆17Updated 5 years ago
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆19Updated last year
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Updated 3 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated last year
- Multi-Authority Policy-based Chameleon Hash☆9Updated 3 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆29Updated 3 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆16Updated 2 years ago
- 变色龙哈希☆21Updated 3 years ago
- Efficient Dynamic Proof of Retrievability☆11Updated 9 months ago
- Implemented the PBFT Consensus algorithm. PBFT is a fault tolerant algorithm which reaches consensus even having n/3 faulty nodes☆21Updated 4 years ago
- fabric blockchain with medical data using privacy preserving technology☆12Updated 3 years ago
- ☆62Updated 3 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆17Updated 4 years ago
- Paper Notes in MPC with Applications to PPML☆65Updated 8 months ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆35Updated 6 years ago
- A secure aggregation system for private federated learning☆36Updated 6 months ago
- personal implementation of secure aggregation protocol☆42Updated 9 months ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Updated 8 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Updated 4 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆13Updated 2 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆38Updated 4 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆47Updated 5 years ago
- Boolean Query SSE schemes☆14Updated 6 years ago
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆10Updated 10 months ago
- ☆10Updated 5 months ago
- Privacy-preserving federated learning is distributed machine learning where multiple collaborators train a model through protected gradi…☆27Updated 3 years ago