DivyanshRoy / Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC-View external linksLinks
Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.
☆18Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC-
Users that are interested in Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC- are comparing it to the libraries listed below
Sorting:
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆23Jul 6, 2018Updated 7 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- ☆10Apr 13, 2022Updated 3 years ago
- Decentralized CP-ABE☆119Jan 14, 2025Updated last year
- ☆25Dec 21, 2018Updated 7 years ago
- 基于hyperledger fabric区块链搭建的医疗病例共享及转诊平台☆32Oct 22, 2022Updated 3 years ago
- 基于FISCO-BCOS区块链的供应链demo,使用node.js构建后端☆10Jan 28, 2021Updated 5 years ago
- 拜占庭算法 PBFT的JAVA版本实现,在PBFT算法实现同时加入了以下几个功能 1、动态加减公式节点 2、发起升级请求 3、数据同步☆10Jun 15, 2022Updated 3 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- DHG-Bench is a comprehensive benchmark for Deep Hypergraph Learning☆29Feb 3, 2026Updated last week
- ☆15Nov 3, 2022Updated 3 years ago
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Note DApp on Ethereum☆11Dec 3, 2022Updated 3 years ago
- Code for S&P (Oakland) 2023 paper "GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text…☆14Feb 13, 2024Updated 2 years ago
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated last year
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago
- @Deprecated 参考lovetuzitong/MultiImageSelector 仿微信选择图片☆12Feb 25, 2016Updated 9 years ago
- Go version of the Pedersen commitment scheme☆15Apr 11, 2020Updated 5 years ago
- Tensor-based hypergraph neural networks☆18May 5, 2024Updated last year
- 公钥可搜索加密☆17Jan 17, 2021Updated 5 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- 主动FTP客户端的实现☆15Aug 25, 2017Updated 8 years ago
- 基于PCAP的网络入侵检测系统☆16Jan 19, 2022Updated 4 years ago
- Publicly cryptographically verifiable electronic voting system powered by immudb☆22Mar 1, 2021Updated 4 years ago
- 全国人社窗口单位业务技能——在线自动答题~基于PysimpleGUI实现☝️☝️☝️内置独家题库,无需自己下载,目前已实现自动「日日学」,「周周练」☄️ 请下载最新的release:https://github.com/ExcaliburEX/AutomaticOnline…☆20May 23, 2023Updated 2 years ago
- 多方安全计算技术&联邦学习相关/Multi party security computing technology federated learning☆18Feb 18, 2024Updated last year
- Code for "Graph Contrastive Learning with Cohesive Subgraph Awareness"☆19Feb 29, 2024Updated last year
- A Latex template for journal review response (initially designed for IEEE TGRS)☆34Aug 3, 2024Updated last year
- uniapp实现, 小程序 app端 仿京东,淘宝,苏宁易购等功能的电商项目☆18May 17, 2020Updated 5 years ago
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆298Dec 9, 2022Updated 3 years ago
- Use paillier in FISCO BCOS☆69Dec 12, 2023Updated 2 years ago
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Apr 1, 2025Updated 10 months ago
- ☆20Dec 2, 2018Updated 7 years ago
- Java implementation of an attribute-based encryption scheme☆18Apr 21, 2016Updated 9 years ago
- Swift implementation of Ethereum 2.0 beacon chain☆42Jul 31, 2019Updated 6 years ago