Decentralized-Anonymity-Network / BadNetLinks
BADNET: A Blockchain-Based Decentralized Anonymity Network
☆11Updated 3 months ago
Alternatives and similar repositories for BadNet
Users that are interested in BadNet are comparing it to the libraries listed below
Sorting:
- This is the repository to host the code for hslang parsing and code generation.☆20Updated 3 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆40Updated 4 years ago
- 基本已完成状态☆12Updated 5 years ago
- A curated list of academic blockchain-related papers☆126Updated 4 months ago
- Codes for WF attacks, defenses☆83Updated last year
- A small example of how to use the bls-eth-go-binary☆13Updated 2 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- Network simulation for PBFT (Practical Byzantine Fault Tolerance) consensus algorithm in Python☆20Updated 4 years ago
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆12Updated last year
- 基于访问树构造的属性基加密☆62Updated 3 years ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆78Updated 6 years ago
- A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private s…☆88Updated last year
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆54Updated last year
- An efficient implementation of the PHANTOM (GhostDAG) block-DAG protocol, complete with a block-DAG network simulation framework and othe…☆46Updated 3 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- ☆62Updated 4 years ago
- Multi-Authority Policy-based Chameleon Hash☆16Updated 4 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14Updated 8 years ago
- Xscope: Hunting for Cross-Chain Bridge Attacks☆15Updated 3 years ago
- Confidentiality-Preserving Smart Contract Platform☆22Updated 5 years ago
- 浙江大学incas实验室-区块链顶会论文展示☆51Updated 2 years ago
- Attribute-based Encryption☆206Updated 5 years ago
- This repository includes the codes and files related to the paper titled "An Unsupervised Learning Based Approach for Mining Attribute Ba…☆10Updated 4 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆186Updated 2 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆18Updated 7 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 3 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆18Updated last year
- Learn and share papers about Block Chain☆32Updated 5 years ago
- BlockSim: An Extensible Simulation Tool forBlockchain Systems☆97Updated 3 years ago
- ☆56Updated 3 years ago