SherLzp / goRecryptLinks
Proxy Re-Encryption go implementation
☆89Updated 5 years ago
Alternatives and similar repositories for goRecrypt
Users that are interested in goRecrypt are comparing it to the libraries listed below
Sorting:
- A Go implementation of the partially homomorphic Paillier Cryptosystem.☆152Updated 6 years ago
- A simple implementation of HotStuff consensus protocol☆18Updated 5 years ago
- Pairing-based cryptography for Go☆102Updated 7 years ago
- Functional encryption library in Go☆192Updated 2 years ago
- Implementation of the SmartBFT consensus library (https://arxiv.org/abs/2107.06922)☆104Updated last week
- ☆213Updated 2 weeks ago
- This project is the crypto library for XuperChain. Ring signature, multi signature, schnorr signature, secret share, hierarchical determi…☆64Updated 2 years ago
- ☆62Updated 4 years ago
- zkSNARK library implementation in Go from scratch (compiler, setup, prover, verifier)☆259Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 5 years ago
- FPC enables Confidential Chaincode Execution for Hyperledger Fabric using Intel SGX.☆170Updated 2 weeks ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆40Updated 5 years ago
- Sample implementation of PBFT consensus algorithm☆234Updated 4 years ago
- bbs04 signature in golang☆16Updated 6 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 3 years ago
- A Hyperledger Fabric Based Access Control system to mediate access control flow from centralized applications.☆47Updated 3 years ago
- multi-authority attribute based encryption☆44Updated 5 years ago
- Example to create merkle path proof using libsnark☆45Updated 5 years ago
- Probe is a web GUI application with for Hyperledger Fabric maintainer, user, research to find the best block config logic for specific ch…☆36Updated 3 weeks ago
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆55Updated 2 years ago
- The Honey Badger of BFT Protocols☆143Updated 3 years ago
- Boneh–Lynn–Shacham signature scheme.☆36Updated 7 years ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆76Updated 6 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 7 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 4 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Updated 7 years ago
- Hyperledger Fabric Network for file sharing using Multi-Authority Attribute Based Encryption as the encryption scheme and IPFS as the d…☆12Updated 6 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Updated 3 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 5 years ago
- Java Boneh, Lynn, and Shacham (BLS) Signature Aggregation. Implementation of "Aggregate and Verifiably Encrypted Signatures from Bilinear…☆26Updated 7 years ago