This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key. The AES Key is encrypted with the Sender's Public RSA Key. The AES Key is then Re-Encrypted at the Server so that it can be decrypted by the Reciever's Private RSA Key. After the decryption of the AES Key at …
☆27Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for ProxyReEncryption-RSA-AES-
Users that are interested in ProxyReEncryption-RSA-AES- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆23Jul 6, 2018Updated 7 years ago
- Transform encryption library for Scala☆36Apr 7, 2026Updated 3 weeks ago
- FAME CP-ABE Encryption based on JPBC☆27Jan 16, 2020Updated 6 years ago
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆297Dec 9, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A python implementation of distributed key generation over secp256k1☆13Nov 27, 2017Updated 8 years ago
- ☆10Apr 13, 2022Updated 4 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Sep 15, 2025Updated 7 months ago
- 自己写的一个简单的区块链系统,实现了分布式的区块链信息存储,服务器数据库只保存状态信息供用户选择,而具体数据则是由服务器与客户端交互从客户端获取☆13Apr 20, 2021Updated 5 years ago
- Group Signature Camenisch-Lysyanskaya Scheme C++, Pairing-Based Cryptography library☆14Feb 16, 2015Updated 11 years ago
- a lib for bls signature in golang☆11Nov 29, 2020Updated 5 years ago
- Distributed key generation☆21Aug 16, 2018Updated 7 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Proxy Re-Encryption library using Bilinear Maps in JavaScript.☆14Feb 7, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- Cryptographic library written in JavaScript. Created at UZH as a part of an E-Voting project.☆14Jan 24, 2023Updated 3 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- PoC implementation of follow-the-satoshi in a Merkle tree.☆19Nov 6, 2021Updated 4 years ago
- Bindings from recrypt-rs to work with NodeJS☆24Updated this week
- 基于Solidity语言的,提供多个参与方之间流转数字积分的智能合约示例☆10Aug 8, 2017Updated 8 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- Implementation of the CL signature scheme☆24Nov 10, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC).☆30Feb 4, 2025Updated last year
- In ancient Egypt the pelican was believed to possess the ability to prophesy safe passage in the underworld. Pelicans are ferocious eater…☆11Apr 7, 2023Updated 3 years ago
- 2D Convolutional KAN Layers with different types of activation functions☆12Sep 29, 2024Updated last year
- Inside this repository you'll find the NoLimitCoin ($NLC2) Core. This is the official blockchain solution powering the Nolimitcoin projec…☆10Jul 8, 2021Updated 4 years ago
- MurmurHash function for PHP extension.☆11Jul 15, 2018Updated 7 years ago
- Message broker with log-structured storage and HTTP API☆37Sep 8, 2023Updated 2 years ago
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- Sample implementation of NSEC5 cryptography☆24Aug 27, 2018Updated 7 years ago
- A TCP-like protocol implemented on top of UDP☆10Sep 7, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CSC 541 Assignment 4 B-Trees Introduction The goals of this assignment are two-fold: To introduce you to searching data on disk using B…☆11May 10, 2015Updated 10 years ago
- A persisted drop-in replacement for Memcached, respecting the rules of quitsies.☆16Sep 9, 2019Updated 6 years ago
- d2js - 前后端web数据框架; jssp - Javascript Server Page;☆19Apr 20, 2020Updated 6 years ago
- Network/Transport Protocol Comparison Tool (UDP vs TCP, Custom vs TCP, IPv4 vs IPv6)☆11Jun 15, 2017Updated 8 years ago
- Key-value storage LSM-style and whatever will grow out of it.☆11Jan 6, 2017Updated 9 years ago
- ☆25Jul 1, 2022Updated 3 years ago
- Implementation of the UsbBus trait of usb-device, which simulates a Bus as a USBIP Server. Useful for developing UsbClass traits and simu…☆20Nov 15, 2023Updated 2 years ago