Yash0day / ElgamalEncryption-using-ECCLinks
Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7
☆12Updated 6 years ago
Alternatives and similar repositories for ElgamalEncryption-using-ECC
Users that are interested in ElgamalEncryption-using-ECC are comparing it to the libraries listed below
Sorting:
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 11 months ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆53Updated 5 years ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆16Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Attribute-based Encryption☆201Updated 4 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆21Updated last year
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 3 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆183Updated 4 years ago
- ☆11Updated 5 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated 10 months ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- ☆20Updated 6 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆35Updated 3 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- pairing based cryptography☆13Updated 6 years ago
- ☆20Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Implementation of the Paillier homomorphic cryptosystem using GMP☆29Updated 3 years ago
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆10Updated 2 years ago
- ☆27Updated 6 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Updated 6 years ago
- The OpenABE library - open source cryptographic library with attribute-based encryption implementations in C/C++☆270Updated 2 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago