SherLzp / goRecryptLinks
Proxy Re-Encryption go implementation
☆86Updated 5 years ago
Alternatives and similar repositories for goRecrypt
Users that are interested in goRecrypt are comparing it to the libraries listed below
Sorting:
- This project is the crypto library for XuperChain. Ring signature, multi signature, schnorr signature, secret share, hierarchical determi…☆64Updated last year
- A Go implementation of the partially homomorphic Paillier Cryptosystem.☆151Updated 6 years ago
- multi-authority attribute based encryption☆43Updated 4 years ago
- A simple implementation of HotStuff consensus protocol☆18Updated 4 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆45Updated 3 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 4 years ago
- Functional encryption library in Go☆183Updated 2 years ago
- bbs04 signature in golang☆16Updated 6 years ago
- ☆201Updated this week
- ☆62Updated 4 years ago
- Go语言实现PBFT算法☆50Updated 3 years ago
- A group signature library for FISCO BCOS☆30Updated 2 years ago
- Pairing-based cryptography for Go☆101Updated 6 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- Probe is a web GUI application with for Hyperledger Fabric maintainer, user, research to find the best block config logic for specific ch…☆36Updated this week
- RPC server for group-signature and ring-signature☆41Updated 4 years ago
- Client of group-signature and ring-signature☆41Updated 2 years ago
- Implementation of the SmartBFT consensus library (https://arxiv.org/abs/2107.06922)☆102Updated last week
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆20Updated 2 years ago
- Go version of the Pedersen commitment scheme☆14Updated 5 years ago
- ☆26Updated 2 years ago
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆52Updated 2 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- Boneh–Lynn–Shacham signature scheme.☆36Updated 7 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆35Updated 3 years ago
- ☆11Updated 5 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Updated 6 years ago
- Multi-Authority Policy-based Chameleon Hash☆14Updated 4 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago