ishaq / Paillier-E-VotingLinks
E-Voting scheme that utilizes Paillier Encryption and its additive homomorphic property.
☆9Updated 8 years ago
Alternatives and similar repositories for Paillier-E-Voting
Users that are interested in Paillier-E-Voting are comparing it to the libraries listed below
Sorting:
- Hashing to Elliptic Curves☆81Updated 9 months ago
- A brief summary of a few talks I attended☆14Updated 5 years ago
- Confidentiality-Preserving Smart Contract Platform☆22Updated 5 years ago
- Proof-of-concept implementation of a homomorphic Simon encryption using YASHE and FV leveled homomorphic cryptosystems☆19Updated 9 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Updated 9 months ago
- Pure Python Paillier Homomorphic Cryptosystem☆134Updated 6 years ago
- Implementation of the CL signature scheme☆24Updated 8 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.☆65Updated 4 years ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆53Updated 2 weeks ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Python implementation of the elgamal crypto system☆72Updated 4 years ago
- Implements an RSA accumulator in Python☆14Updated 6 years ago
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆25Updated 3 years ago
- Pinocchio-based adaptive zk-SNARK and distributed computation☆17Updated 7 years ago
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Updated 4 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆129Updated 9 years ago
- A Go library for MerkleSquare: A Low-Latency Transparency Log System☆22Updated 4 years ago
- A Python implementation of fuzzy extractor.☆58Updated 2 years ago
- ☆50Updated 2 years ago
- BGN encryption scheme implementation using Go☆16Updated 4 years ago
- ☆36Updated 4 years ago
- An implementation of the Groth-Sahai NIZK protocol☆14Updated 8 years ago
- Attribute-based Encryption☆201Updated 4 years ago
- ☆12Updated 2 years ago
- A lightweight Key-Policy Attribute-Based Encryption scheme in C++☆24Updated 7 years ago
- ☆21Updated last year
- A two-party secure function evaluation using Yao's garbled circuit protocol☆76Updated last year
- Zero-Knowledge Swiss Knife☆94Updated 2 years ago
- Code repository for technical papers about selfish mining analysis.☆12Updated 2 years ago