hjlpb / ABEView external linksLinks
☆56Apr 4, 2022Updated 3 years ago
Alternatives and similar repositories for ABE
Users that are interested in ABE are comparing it to the libraries listed below
Sorting:
- ☆20Apr 28, 2022Updated 3 years ago
- 基于访问树构造的属性基加密☆65Jul 26, 2022Updated 3 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆284Jan 4, 2025Updated last year
- FAME CP-ABE Encryption based on JPBC☆28Jan 16, 2020Updated 6 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆37Jan 12, 2019Updated 7 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- Decentralized CP-ABE☆119Jan 14, 2025Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- ☆10Jun 6, 2021Updated 4 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- fabric-iot is a Blockchain Based Decentralized Access Control System in IoT☆79Oct 2, 2023Updated 2 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 2 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Nov 23, 2017Updated 8 years ago
- This is an implementation of the Pracltical Byzantine Fault Tolerance protocol using Python☆21Dec 16, 2025Updated last month
- The purpose of this project is to build a software Library that can be applied to diAPP, enOS and lenOS, including a variety of Searchabl…☆34Mar 15, 2023Updated 2 years ago
- ☆11Jan 9, 2022Updated 4 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Dec 11, 2015Updated 10 years ago
- ☆22Jun 20, 2024Updated last year
- ☆25Dec 21, 2018Updated 7 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Nov 11, 2020Updated 5 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆11Apr 1, 2023Updated 2 years ago
- ☆11Aug 20, 2024Updated last year
- ☆11May 7, 2020Updated 5 years ago
- ☆10Mar 26, 2022Updated 3 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Dec 27, 2023Updated 2 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆11Nov 26, 2020Updated 5 years ago
- ☆24May 16, 2013Updated 12 years ago
- ☆14Apr 24, 2020Updated 5 years ago
- 清华学神尹成专业翻译定制版Fabric源码☆46Jan 21, 2019Updated 7 years ago
- The zero knowledge proof system used in Delta.☆13Mar 17, 2023Updated 2 years ago
- ☆11May 2, 2020Updated 5 years ago
- 0xcert documentation☆15Dec 2, 2023Updated 2 years ago
- ☆15Apr 27, 2020Updated 5 years ago
- Hermes IBC Workshop - Fungible Token Transfer (ics-20) between two Starport chains☆13Nov 18, 2021Updated 4 years ago