☆10Jun 6, 2021Updated 4 years ago
Alternatives and similar repositories for CP-ABE
Users that are interested in CP-ABE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 3 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 3 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 4 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆28May 8, 2023Updated 2 years ago
- Decentralized CP-ABE☆119Apr 18, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repository is some implementation of ABE (attribute-base encryption) scheme☆21Nov 2, 2020Updated 5 years ago
- FAME CP-ABE Encryption based on JPBC☆27Jan 16, 2020Updated 6 years ago
- CP-ABE-Blockchain experiments☆16Jul 4, 2024Updated last year
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆34Apr 13, 2023Updated 3 years ago
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated 2 years ago
- Attribute-based Encryption☆208Jul 31, 2020Updated 5 years ago
- Example scripts working with Mininet network emulator☆10Dec 3, 2016Updated 9 years ago
- ☆11May 7, 2020Updated 5 years ago
- A fuzzing environment for RL, based on Gym and AFL.☆13Dec 19, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- 热门框架/组件/服务漏洞的描述/利用/修复☆12Apr 13, 2023Updated 3 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 10 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- This website enables users to select fruits online. (Final project of web application development).☆10Sep 25, 2023Updated 2 years ago
- constant size cp-abe searchable encryptyion scheme☆12Oct 9, 2018Updated 7 years ago
- Hyperledger Fabric Network for file sharing using Multi-Authority Attribute Based Encryption as the encryption scheme and IPFS as the d…☆12May 6, 2019Updated 7 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆15Jul 7, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lập trình Python cho Máy học☆15Dec 25, 2021Updated 4 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆25Feb 20, 2024Updated 2 years ago
- Golang implementation of Monotone Span Programs☆23May 6, 2016Updated 10 years ago
- 漏洞盒子入驻企业列表爬虫☆14Jan 18, 2019Updated 7 years ago
- Computer Networks Project - Khulna University☆20Apr 18, 2017Updated 9 years ago
- w8ay专属扫描器☆11Feb 9, 2017Updated 9 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- Sample code for Atomic Crosschain Transactions☆21Dec 17, 2021Updated 4 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Thinkphp各版本漏洞验证脚本☆32Mar 16, 2023Updated 3 years ago
- 0xcert documentation☆15Dec 2, 2023Updated 2 years ago
- attribute-based access control implementation for EHRs☆16May 25, 2023Updated 2 years ago
- ☆27Nov 29, 2020Updated 5 years ago
- Learning how to bulletproofs☆40Dec 22, 2018Updated 7 years ago
- Examples of attacks on Ethereum smart contracts such as reentrancy, integer overflow, integer underflow and DoS with revert.☆15Sep 1, 2021Updated 4 years ago
- ☆56Apr 4, 2022Updated 4 years ago