MilkyBoat / RedactableBlockchain
可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for RedactableBlockchain
- ☆52Updated 2 years ago
- ☆24Updated 2 years ago
- 基于访问树构造的属性基加密☆56Updated 2 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆16Updated 2 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆17Updated 4 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆13Updated 7 years ago
- 对称可搜索加密,Cash的实现方案☆16Updated 6 years ago
- fabric blockchain with medical data using privacy preserving technology☆12Updated 3 years ago
- Decentralized CP-ABE☆106Updated last month
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆29Updated 3 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆47Updated 5 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆21Updated last year
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆17Updated 3 years ago
- FAME CP-ABE Encryption based on JPBC☆27Updated 4 years ago
- Attribute-based Encryption☆19Updated last year
- 变色龙哈希☆21Updated 3 years ago
- 公钥可搜索加密☆17Updated 3 years ago
- ☆23Updated 5 years ago
- Multi-Authority Policy-based Chameleon Hash☆9Updated 3 years ago
- CP-ABE-Blockchain experiments☆9Updated 4 months ago
- CP-ABE-based-on-ECC-implementation☆10Updated 2 years ago
- The Description of the project you can watch my blog☆33Updated 3 years ago
- go版本的cpabe☆10Updated 2 years ago
- 这是一个基于Paillier同态加密系统的隐私保护SVM模型训练算法。☆13Updated 2 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆34Updated 5 years ago
- Outsourcing Decentralized CP-ABE☆10Updated 2 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆16Updated last year
- ☆10Updated 5 months ago
- Maintain a list of open source libraries of cryptographic excellence☆57Updated last year
- Symmetric-key Hidden Vector Encryption Scheme☆18Updated 6 years ago