Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol
☆12Sep 15, 2025Updated 6 months ago
Alternatives and similar repositories for thresh-paillier-wo-td
Users that are interested in thresh-paillier-wo-td are comparing it to the libraries listed below
Sorting:
- TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Distributed Keygen☆28Dec 10, 2024Updated last year
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Dec 27, 2019Updated 6 years ago
- A python implementation of distributed key generation over secp256k1☆13Nov 27, 2017Updated 8 years ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- 星火主链和以太坊测试网跨链验证平台☆14Sep 23, 2021Updated 4 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- Graph Homomorphism Convolution (ICML'20)☆12Jul 6, 2023Updated 2 years ago
- Distributed key generation☆21Aug 16, 2018Updated 7 years ago
- Balanced K-means in Pytorch with strong GPU acceleration☆12Apr 30, 2020Updated 5 years ago
- Decentralized Asynchronous Training on Heterogeneous Devices☆10Nov 11, 2025Updated 4 months ago
- Webauthn demo with react.js and Spring boot☆13Aug 20, 2023Updated 2 years ago
- ☆37Jul 5, 2018Updated 7 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- Research Prototype for DeXTT☆18Mar 18, 2019Updated 7 years ago
- It is a public-key encryption in which the public key of a user is identity(unique).☆14May 25, 2015Updated 10 years ago
- An easy way to bridge cross-chain assets between blockchains.☆98Apr 14, 2023Updated 2 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆24Jul 6, 2018Updated 7 years ago
- Data Structure and Algorithm for Graphs☆16Nov 1, 2017Updated 8 years ago
- Circuit PSI using garbled cuckoo filter☆11Dec 21, 2022Updated 3 years ago
- Bindings from recrypt-rs to work with NodeJS☆24Mar 12, 2026Updated last week
- Cross-Chain Multi-Chain Block Explorer☆19Jul 16, 2024Updated last year
- CrossChain in fabric☆23Apr 12, 2021Updated 4 years ago
- Sample code for Atomic Crosschain Transactions☆21Dec 17, 2021Updated 4 years ago
- Stanford Cryptography class excercises☆20May 13, 2012Updated 13 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- Record some of my tools, not limited to language☆12Jan 3, 2016Updated 10 years ago
- privacy preserving deep learning☆15Sep 11, 2017Updated 8 years ago
- Some tests / examples for Open MPI's Java MPI bindings☆13Mar 21, 2018Updated 7 years ago
- A widget for Ubersicht that displays the last N commits☆12May 20, 2016Updated 9 years ago
- Ansible Role for SSH☆12Feb 15, 2015Updated 11 years ago
- ☆70Dec 13, 2021Updated 4 years ago
- 自动填写问卷 星表单☆10Mar 18, 2019Updated 7 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 4 years ago
- Repository for testing code for UAV_UGV co-operative perception and planning☆15Mar 16, 2018Updated 8 years ago
- ☆17Mar 13, 2017Updated 9 years ago
- Demos for Flink connectors on Ververica Platform (VVP)☆45Jun 25, 2025Updated 8 months ago
- Use paillier in FISCO BCOS☆69Dec 12, 2023Updated 2 years ago