☆10Jun 6, 2021Updated 4 years ago
Alternatives and similar repositories for CP-ABE
Users that are interested in CP-ABE are comparing it to the libraries listed below
Sorting:
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 2 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 2 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆37Jan 12, 2019Updated 7 years ago
- Decentralized CP-ABE☆119Jan 14, 2025Updated last year
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆192Mar 29, 2021Updated 4 years ago
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated last year
- Attribute-based Encryption☆207Jul 31, 2020Updated 5 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- constant size cp-abe searchable encryptyion scheme☆12Oct 9, 2018Updated 7 years ago
- Example scripts working with Mininet network emulator☆10Dec 3, 2016Updated 9 years ago
- ☆11May 7, 2020Updated 5 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- A fuzzing environment for RL, based on Gym and AFL.☆13Dec 19, 2020Updated 5 years ago
- ☆14Dec 8, 2021Updated 4 years ago
- 热门框架/组件/服务漏洞的描述/利用/修复☆12Apr 13, 2023Updated 2 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Jul 7, 2024Updated last year
- This website enables users to select fruits online. (Final project of web application development).☆10Sep 25, 2023Updated 2 years ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Hyperledger Fabric Network for file sharing using Multi-Authority Attribute Based Encryption as the encryption scheme and IPFS as the d…☆12May 6, 2019Updated 6 years ago
- 0xcert documentation☆15Dec 2, 2023Updated 2 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- DNS Performance Measurement Library with support for Do53, DoTCP, DoT, DoH and DoQ☆17Sep 8, 2022Updated 3 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- 一个抓取freebuf所有栏目的文章的爬虫,以网页形式展现,上传了一些爬取好的结果☆15Aug 20, 2016Updated 9 years ago
- Source code for the ICDE22 paper "vChain+: Optimizing Verifiable Blockchain Boolean Range Queries"☆21Feb 21, 2023Updated 3 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Sep 1, 2021Updated 4 years ago
- ☆15Jul 18, 2016Updated 9 years ago
- 常见web漏洞(Sql注入、XSS、CSRF)攻防总结☆19Mar 31, 2018Updated 7 years ago
- attribute-based access control implementation for EHRs☆16May 25, 2023Updated 2 years ago
- ☆24May 17, 2024Updated last year
- Computer Networks Project - Khulna University☆20Apr 18, 2017Updated 8 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- ☆25Nov 29, 2020Updated 5 years ago