Gao-Chuan / encrypt_netdisk
An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allowed.
☆16Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for encrypt_netdisk
- ☆11Updated 4 years ago
- ☆7Updated 3 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆34Updated 5 years ago
- FAME CP-ABE Encryption based on JPBC☆27Updated 4 years ago
- CP-ABE-based-on-ECC-implementation☆10Updated 2 years ago
- Outsourcing Decentralized CP-ABE☆10Updated 2 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆16Updated last year
- This repository is some implementation of ABE (attribute-base encryption) scheme☆17Updated 4 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆13Updated 7 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆21Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆47Updated 5 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆16Updated last year
- Decentralized CP-ABE☆106Updated last month
- Attribute-based Encryption☆191Updated 4 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆17Updated 3 years ago
- LSSS, ABE☆14Updated 3 years ago
- Attribute-based Encryption☆19Updated last year
- ☆23Updated 5 years ago
- ☆52Updated 2 years ago
- Graduate Project: CP-ABE-Encrypt☆20Updated 11 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆15Updated 5 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆177Updated 3 years ago
- ☆24Updated 2 years ago
- 基于访问树构造的属性基加密☆56Updated 2 years ago
- Encrypting User Data with Attribute-Based Encryption Using Privacy Policies☆8Updated 6 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆17Updated 5 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆29Updated 3 years ago
- constant size cp-abe searchable encryptyion scheme☆10Updated 6 years ago
- Boolean Query SSE schemes☆14Updated 6 years ago
- multi-authority attribute based encryption☆38Updated 4 years ago