hjlpb / FIBELinks
☆10Updated 3 years ago
Alternatives and similar repositories for FIBE
Users that are interested in FIBE are comparing it to the libraries listed below
Sorting:
- ☆56Updated 3 years ago
- 这是一个基于同态加密算法实现的隐私保护电子投票系统☆58Updated 3 years ago
- 对称可搜索加密,Cash的实现方案☆19Updated 7 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- ☆10Updated 4 years ago
- 公钥可搜索加密☆17Updated 4 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Updated 2 years ago
- 基于访问树构造的属性基加密☆62Updated 3 years ago
- 一种基于全同态加密技术的医疗隐私保密系统,是一个较为成熟的项目,公开源代码实现,小组成员如下:王子旭、许嘉晨、夏萌、王宏任☆61Updated 7 years ago
- The Description of the project you can watch my blog☆37Updated 4 years ago
- CP-ABE-Blockchain experiments☆16Updated last year
- 基于安全多方计算的隐私保护系统设计与实现☆49Updated 3 years ago
- 《信息内容安全》课程设计——搜索引擎☆13Updated 5 years ago
- Decentralized CP-ABE☆119Updated 9 months ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Updated 4 years ago
- ☆26Updated 3 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- 毕业设计--基于区块链的医疗记录存储系统研究与开发☆71Updated 5 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Updated 2 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14Updated 8 years ago
- pairing based cryptography☆16Updated 7 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 7 years ago
- JPBC_Optimize_IBE by JPBC☆22Updated 6 years ago
- CP-ABE-based-on-ECC-implementation☆11Updated 3 years ago
- 变色龙哈希☆25Updated 4 years ago
- IBE implementation based on jpbc☆17Updated 3 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- 一个基于区块链+同态加密+小程序的隐私保护方案☆39Updated 2 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 3 years ago