This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key. The AES Key is encrypted with the Sender's Public RSA Key. The AES Key is then Re-Encrypted at the Server so that it can be decrypted by the Reciever's Private RSA Key. After the decryption of the AES Key at …
☆27Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for ProxyReEncryption-RSA-AES-
Users that are interested in ProxyReEncryption-RSA-AES- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆24Jul 6, 2018Updated 7 years ago
- Proxy Re-Encryption go implementation☆88Apr 5, 2020Updated 6 years ago
- Simple Free RSA / AES Encryption and Decryption☆10Apr 2, 2026Updated last week
- Network secure tunnel software, supports TCP and UDP with RSA + AES technologies, developed by golang.☆18Dec 8, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆299Dec 9, 2022Updated 3 years ago
- A python implementation of distributed key generation over secp256k1☆13Nov 27, 2017Updated 8 years ago
- JS SDK for Proxy ReEncryption functionality, support spec256k1☆15Nov 11, 2019Updated 6 years ago
- Pre-alpha end-to-end encrypted instant messenger.☆24Jan 20, 2023Updated 3 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Sep 15, 2025Updated 6 months ago
- a lib for bls signature in golang☆11Nov 29, 2020Updated 5 years ago
- AFGH Proxy Re-Encryption with RELIC (C library)☆12Mar 5, 2020Updated 6 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cryptographic library written in JavaScript. Created at UZH as a part of an E-Voting project.☆14Jan 24, 2023Updated 3 years ago
- Bindings from recrypt-rs to work with NodeJS☆24Mar 25, 2026Updated 2 weeks ago
- ☆14Jan 23, 2023Updated 3 years ago
- Implementation of the CL signature scheme☆24Nov 10, 2016Updated 9 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last month
- In ancient Egypt the pelican was believed to possess the ability to prophesy safe passage in the underworld. Pelicans are ferocious eater…☆11Apr 7, 2023Updated 3 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- 2D Convolutional KAN Layers with different types of activation functions☆12Sep 29, 2024Updated last year
- MurmurHash function for PHP extension.☆11Jul 15, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple transpiler that transforms your PHP file to C++ file.☆13Jun 16, 2016Updated 9 years ago
- Sample implementation of NSEC5 cryptography☆23Aug 27, 2018Updated 7 years ago
- 🗄️ Networked in-memory key-value store.☆11Jan 2, 2018Updated 8 years ago
- attribute-based access control implementation for EHRs☆16May 25, 2023Updated 2 years ago
- CSC 541 Assignment 4 B-Trees Introduction The goals of this assignment are two-fold: To introduce you to searching data on disk using B…☆11May 10, 2015Updated 10 years ago
- Key-value storage LSM-style and whatever will grow out of it.☆11Jan 6, 2017Updated 9 years ago
- ☆25Jul 1, 2022Updated 3 years ago
- Bukkit/Spigot plugin integrates Minecraft chat with a Telegram group☆10Apr 5, 2020Updated 6 years ago
- The decentralized, completely anonymous, lightweight, peer-to-peer network communication protocol.☆26Jul 21, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SSDB - A fast NoSQL database, an alternative to Redis☆12Feb 8, 2017Updated 9 years ago
- Fast JSON parsing and encoding support for PHP extension☆11Jan 11, 2019Updated 7 years ago
- Scalable Kubernetes-native implementation of the Open Data Fabric protocol for global collaborative data processing☆23Mar 28, 2026Updated last week
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- Curve25519 ECIES☆10Oct 18, 2016Updated 9 years ago
- 基于FISCO-BCOS区块链的供应链demo,使用node.js构建后端☆10Jan 28, 2021Updated 5 years ago
- Proof of concept extension of sendme to use global content discovery☆22Jan 17, 2025Updated last year