HappySusan2016 / ProvChain
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
☆14Updated 6 years ago
Alternatives and similar repositories for ProvChain:
Users that are interested in ProvChain are comparing it to the libraries listed below
- This is the repository to host the code for hslang parsing and code generation.☆21Updated 2 years ago
- ☆9Updated 5 years ago
- PrivacyGuard is a platform that combines blockchain smart contract and TEE to enable transparent enforcement of private data computation …☆27Updated 2 years ago
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Updated 3 years ago
- fabric blockchain with medical data using privacy preserving technology☆12Updated 4 years ago
- Multi-Authority Policy-based Chameleon Hash☆11Updated 4 years ago
- Implemented the PBFT Consensus algorithm. PBFT is a fault tolerant algorithm which reaches consensus even having n/3 faulty nodes☆22Updated 4 years ago
- Privacy-preserving federated learning is distributed machine learning where multiple collaborators train a model through protected gradi…☆27Updated 3 years ago
- Personal Data Management business logic written in Smart Contracts☆20Updated 2 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 2 years ago
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆19Updated last year
- ☆53Updated 2 years ago
- MPC Secure Multiparty Computation. A three-party secret-sharing-based vertical federated learning setting. The data are vertically parti…☆24Updated 5 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆53Updated 3 years ago
- This Projects has implemented three asymmetric and homomorphic encryption BGN, Benaloh, Paillier in Java using JPBC library.☆10Updated 5 years ago
- ☆13Updated 3 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago
- Privacy-Preserving Deep Learning via Additively Homomorphic Encryption☆67Updated 4 years ago
- personal implementation of secure aggregation protocol☆44Updated 11 months ago
- ☆15Updated 2 years ago
- pairing based cryptography☆12Updated 6 years ago
- Graduate Project: CP-ABE-Encrypt☆20Updated 11 years ago
- ☆36Updated 3 years ago
- The code for our Updates-Leak paper☆17Updated 4 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆9Updated 2 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆53Updated 5 years ago
- A rapidchain implementation for my master thesis☆23Updated 4 years ago
- ☆10Updated 8 months ago
- LSSS, ABE☆15Updated 4 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆30Updated 7 years ago