joway / JPBC_Optimize_IBE
JPBC_Optimize_IBE by JPBC
☆22Updated 5 years ago
Related projects: ⓘ
- Decentralized CP-ABE☆106Updated 6 months ago
- ☆50Updated 2 years ago
- Electronic anonymous voting system based on paillier algorithm☆16Updated 5 years ago
- ☆23Updated 2 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆29Updated 2 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆46Updated 5 years ago
- Graduate Project: CP-ABE-Encrypt☆20Updated 10 years ago
- ☆17Updated 2 years ago
- 基于访问树构造的属性基加密☆52Updated 2 years ago
- 公钥可搜索加密☆17Updated 3 years ago
- FAME CP-ABE Encryption based on JPBC☆27Updated 4 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆18Updated last year
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆31Updated 5 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆17Updated 3 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆11Updated 3 years ago
- fabric-iot is a Blockchain Based Decentralized Access Control System in IoT☆74Updated 11 months ago
- ☆20Updated 5 years ago
- 《一种面向区块链的优化PBFT共识算法》基础源代码☆60Updated last year
- 一个基于区块链+同态加密+小程序的隐私保护方案☆29Updated last year
- 这是我的本科毕业论文---------基于区块链的物联网设备身份 认证以及针对于物联网系统中的敏感数据访问控制机制的设计与实现☆28Updated 6 months ago
- 变色龙哈希☆21Updated 3 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆14Updated 2 years ago
- ☆20Updated 5 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆47Updated 6 months ago
- ☆93Updated 2 years ago
- 对于Fabric的简单增删改查的通用链码,不同于官方示例的数据插入方式☆39Updated last year
- 这是CP-ABE算法C库的JNI实现,能够满足JAVA环境下的加密开发需要。☆9Updated 9 years ago
- ☆11Updated 4 years ago
- It's a simulator of pbft☆55Updated 6 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆13Updated 7 years ago