Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption
☆27May 8, 2023Updated 2 years ago
Alternatives and similar repositories for CP-ABE
Users that are interested in CP-ABE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 3 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated last year
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆38Jan 12, 2019Updated 7 years ago
- pairing based cryptography☆16Sep 17, 2018Updated 7 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Jun 17, 2019Updated 6 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 10 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- Attribute-based Encryption☆29Jun 30, 2023Updated 2 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Nov 23, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- Cryptographic accumulator☆10Mar 8, 2018Updated 8 years ago
- 代码审计关键词扫描工具☆11Apr 29, 2024Updated last year
- ☆14Jan 3, 2024Updated 2 years ago
- Reed-Solomon Coding with Interleaving , available as a C program and python module.☆10Jun 2, 2015Updated 10 years ago
- This is project is to implement the encrypted scheme from ideal lattice, including TrapGen, SampleLeft etc.☆11Jun 17, 2020Updated 5 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Proxy Re-Encryption go implementation☆87Apr 5, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆14Dec 8, 2021Updated 4 years ago
- ☆10Jan 24, 2022Updated 4 years ago
- MSR LatticeCrypto library http://research.microsoft.com/en-us/projects/latticecrypto/☆14May 25, 2016Updated 9 years ago
- Attribute-based Access Control over Named Data Networking☆17Jul 18, 2025Updated 8 months ago
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 8 months ago
- (2024 ACM MM) Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition☆10Apr 3, 2026Updated last week
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- Python 3 wrapper for the mcl library☆12Jan 16, 2026Updated 2 months ago
- ipcoronafs (ipcfs) is a set of tools for taking coronavirus case information and storing it on IPFs☆15Mar 23, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Jul 22, 2022Updated 3 years ago
- Blockchain reputation-based trust management system☆17Jul 14, 2019Updated 6 years ago
- A Go implementation of RFC 6979's deterministic DSA/ECDSA signature scheme.☆41Oct 3, 2014Updated 11 years ago
- IoV Reputation Mechanism simulation using SUMO, OMNETPP and VEINS.☆17Aug 8, 2020Updated 5 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆25Feb 20, 2024Updated 2 years ago
- Python wrapper for the PBC (Pairing-Based Cryptography) library☆15Jan 16, 2026Updated 2 months ago
- Trust management model in IoT☆16Oct 11, 2021Updated 4 years ago