☆56Apr 4, 2022Updated 3 years ago
Alternatives and similar repositories for ABE
Users that are interested in ABE are comparing it to the libraries listed below
Sorting:
- ☆20Apr 28, 2022Updated 3 years ago
- 基于访问树构造的属性基加密☆65Jul 26, 2022Updated 3 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- FAME CP-ABE Encryption based on JPBC☆28Jan 16, 2020Updated 6 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆192Mar 29, 2021Updated 4 years ago
- 可验证外包加解密的基于密文策略属性加密方案的实验仿真系统(Verifiable Outsourcing CPABE experimental simulation system)☆14Sep 18, 2021Updated 4 years ago
- ☆25Jul 1, 2022Updated 3 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- pairing based cryptography☆16Sep 17, 2018Updated 7 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- The Description of the project you can watch my blog☆37Apr 18, 2021Updated 4 years ago
- fabric-iot is a Blockchain Based Decentralized Access Control System in IoT☆79Oct 2, 2023Updated 2 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 2 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Nov 23, 2017Updated 8 years ago
- This is an implementation of the Pracltical Byzantine Fault Tolerance protocol using Python☆21Dec 16, 2025Updated 2 months ago
- A lightweight Key-Policy Attribute-Based Encryption scheme in C++☆27Jan 29, 2018Updated 8 years ago
- ☆22Jun 20, 2024Updated last year
- ☆11Jan 9, 2022Updated 4 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Dec 11, 2015Updated 10 years ago
- A project managing Electronic Health Records(EHR) of patients and giving permissions to audity using Solidity(Etherium Blockchain) with T…☆11Aug 7, 2021Updated 4 years ago
- ☆11May 7, 2020Updated 5 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆11Nov 26, 2020Updated 5 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 2 years ago
- ☆11Aug 20, 2024Updated last year
- ☆10Mar 26, 2022Updated 3 years ago
- w8ay专属扫描器☆11Feb 9, 2017Updated 9 years ago
- A Chinese translation of the book Java Reflection In Action editing with gitbook.☆11Aug 29, 2016Updated 9 years ago
- 清华学神尹成专业翻译定制版Fabric源码☆46Jan 21, 2019Updated 7 years ago
- Containerized Implementation of LightChain Blockchain (research project)☆12Jun 28, 2021Updated 4 years ago
- ☆11May 2, 2020Updated 5 years ago
- 浙江大学区块链大作业-去中心化NFT拍卖平台(前端完善版)☆10Dec 27, 2021Updated 4 years ago
- Hyperledger Fabric 1.4.4,Hyperledger Caliper 0.3.0 configuration - pbft/solo/multichannel☆50Jun 27, 2021Updated 4 years ago
- simplest ChatGPT CLI☆14Feb 11, 2026Updated 3 weeks ago
- This paper has been accepted by IEEE MASS 2022.☆15Oct 9, 2023Updated 2 years ago
- 一些常见攻击算法的实现☆16May 13, 2021Updated 4 years ago