Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.
☆17Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC-
Users that are interested in Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key…☆27Jan 3, 2019Updated 7 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆23Jul 6, 2018Updated 7 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Nov 15, 2020Updated 5 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- ☆11Jan 9, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Decentralized CP-ABE☆119Apr 18, 2026Updated 3 weeks ago
- Efficient, simple, encrypted personal data store and sharing system.☆12Dec 9, 2019Updated 6 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Re-encryption by proxy and (additive) homomorphic encryption☆13Oct 10, 2018Updated 7 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- ☆11May 7, 2020Updated 6 years ago
- Ring-Signature using secp256k1 in Solidity☆13Jul 6, 2018Updated 7 years ago
- This project helps you to record your voice using iPhone.☆28Nov 19, 2012Updated 13 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- AFGH Proxy Re-Encryption with RELIC (C library)☆12Mar 5, 2020Updated 6 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆59Sep 14, 2025Updated 7 months ago
- Publicly cryptographically verifiable electronic voting system powered by immudb☆22Mar 1, 2021Updated 5 years ago
- Library for generating a key to encrypt/decypt Realm DB☆23Apr 18, 2018Updated 8 years ago
- Proxy Re-Encryption library using Bilinear Maps in JavaScript.☆14Feb 7, 2019Updated 7 years ago
- Attribute-based Encryption☆208Jul 31, 2020Updated 5 years ago
- A pure Swift implementation of Shamir's Secret Sharing scheme☆25Aug 18, 2019Updated 6 years ago
- Go version of the Pedersen commitment scheme☆15Apr 11, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- 基于hyperledger fabric区块链搭建的医疗病例共享及转诊平台☆31Oct 22, 2022Updated 3 years ago
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆297Dec 9, 2022Updated 3 years ago
- ☆18Dec 2, 2018Updated 7 years ago
- 2D Convolutional KAN Layers with different types of activation functions☆12Sep 29, 2024Updated last year
- Basic implementation of Borromean ring signatures in Python, for learning☆17Dec 14, 2017Updated 8 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆13Sep 15, 2025Updated 7 months ago
- 🖖Menlo's front-end demo app: A blockchain q+a discussion dApp that pays for up-voted answers.☆30Apr 29, 2023Updated 3 years ago
- A sample go app to demonstrate fabric-client & fabric-ca-client go SDK APIs☆24Aug 26, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 公钥可搜索加密☆17Jan 17, 2021Updated 5 years ago
- Electronic anonymous voting system based on paillier algorithm☆18Mar 18, 2019Updated 7 years ago
- Sample implementation of NSEC5 cryptography☆24Aug 27, 2018Updated 7 years ago
- 多方安全计算技术&联邦学习相关/Multi party security computing technology federated learning☆18Feb 18, 2024Updated 2 years ago
- Linkable ring signature library☆25Sep 6, 2023Updated 2 years ago
- 移动端数据的加密,采用RSA和AES方式☆31Mar 28, 2017Updated 9 years ago
- Sensitive data sharing system with client side encryption.☆41Feb 28, 2026Updated 2 months ago