This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key. The AES Key is encrypted with the Sender's Public RSA Key. The AES Key is then Re-Encrypted at the Server so that it can be decrypted by the Reciever's Private RSA Key. After the decryption of the AES Key at …
☆27Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for ProxyReEncryption-RSA-AES-
Users that are interested in ProxyReEncryption-RSA-AES- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆17Jan 3, 2019Updated 7 years ago
- Proxy Re-Encryption go implementation☆87Apr 5, 2020Updated 6 years ago
- Transform encryption library for Scala☆36Updated this week
- FAME CP-ABE Encryption based on JPBC☆27Jan 16, 2020Updated 6 years ago
- Efficient, simple, encrypted personal data store and sharing system.☆12Dec 9, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Network secure tunnel software, supports TCP and UDP with RSA + AES technologies, developed by golang.☆18Dec 8, 2015Updated 10 years ago
- A python implementation of distributed key generation over secp256k1☆13Nov 27, 2017Updated 8 years ago
- JS SDK for Proxy ReEncryption functionality, support spec256k1☆14Nov 11, 2019Updated 6 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- Re-encryption by proxy and (additive) homomorphic encryption☆13Oct 10, 2018Updated 7 years ago
- Pre-alpha end-to-end encrypted instant messenger.☆24Jan 20, 2023Updated 3 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆13Sep 15, 2025Updated 8 months ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 10 years ago
- Group Signature Camenisch-Lysyanskaya Scheme C++, Pairing-Based Cryptography library☆14Feb 16, 2015Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- a lib for bls signature in golang☆11Nov 29, 2020Updated 5 years ago
- AFGH Proxy Re-Encryption with RELIC (C library)☆12Mar 5, 2020Updated 6 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 9 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- A simple package designed to streamline the development of a zero-knowledge authentication system with Zupass tickets.☆15Feb 28, 2024Updated 2 years ago
- Cryptographic library written in JavaScript. Created at UZH as a part of an E-Voting project.☆14Jan 24, 2023Updated 3 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- PoC implementation of follow-the-satoshi in a Merkle tree.☆19Nov 6, 2021Updated 4 years ago
- Bindings from recrypt-rs to work with NodeJS☆24Apr 23, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Jan 23, 2023Updated 3 years ago
- Implementation of the CL signature scheme☆24Nov 10, 2016Updated 9 years ago
- Eclipse Keti is a service that was designed to protect RESTfuls API using Attribute Based Access Control (ABAC).☆30Feb 4, 2025Updated last year
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 2 months ago
- In ancient Egypt the pelican was believed to possess the ability to prophesy safe passage in the underworld. Pelicans are ferocious eater…☆11Apr 7, 2023Updated 3 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆21Nov 2, 2020Updated 5 years ago
- DBProxy - A Database Proxy Server base on MySQL☆10Sep 30, 2020Updated 5 years ago
- Message broker with log-structured storage and HTTP API☆37Sep 8, 2023Updated 2 years ago
- A simple transpiler that transforms your PHP file to C++ file.☆13Jun 16, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- A TCP-like protocol implemented on top of UDP☆10Sep 7, 2016Updated 9 years ago
- 🗄️ Networked in-memory key-value store.☆11Jan 2, 2018Updated 8 years ago
- CSC 541 Assignment 4 B-Trees Introduction The goals of this assignment are two-fold: To introduce you to searching data on disk using B…☆11May 10, 2015Updated 11 years ago
- Gidl: an Interface Description Language☆10Aug 11, 2017Updated 8 years ago
- A persisted drop-in replacement for Memcached, respecting the rules of quitsies.☆16Sep 9, 2019Updated 6 years ago
- 2019暑期实训——基于区块链的房屋租赁系统☆28Jun 17, 2022Updated 3 years ago