hjlpb / FIBE
☆10Updated 3 years ago
Alternatives and similar repositories for FIBE:
Users that are interested in FIBE are comparing it to the libraries listed below
- 对称可搜索加密,Cash的实现方案☆19Updated 6 years ago
- ☆55Updated 3 years ago
- 基于访问树构造的属性基加密☆60Updated 2 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆13Updated 3 years ago
- ☆9Updated 3 years ago
- ☆26Updated 6 years ago
- 这是一个基于同态加密算法实现的隐私保护电子投票系统☆57Updated 2 years ago
- Decentralized CP-ABE☆114Updated 3 months ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆17Updated 3 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆31Updated 2 years ago
- ☆20Updated 6 years ago
- ☆24Updated 2 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆9Updated 2 years ago
- FAME CP-ABE Encryption based on JPBC☆29Updated 5 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14Updated 7 years ago
- Outsourcing Decentralized CP-ABE☆11Updated 2 years ago
- JPBC_Optimize_IBE by JPBC☆22Updated 6 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆51Updated last year
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- 基于安全多方计算的隐私保护系统设计与实现☆46Updated 3 years ago
- 公钥可搜索加密☆17Updated 4 years ago
- 变色龙哈希☆23Updated 3 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- 一种基于全同态加密技术的医疗隐私保密系统,是一个较为成熟的项目,公开源代码实现,小组成员如下:王子旭、许嘉晨、夏萌、王宏任☆60Updated 6 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆18Updated 4 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆34Updated 3 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Updated 6 years ago
- Graduate Project: CP-ABE-Encrypt☆20Updated 11 years ago