joway / JPBC_Optimize_IBELinks
JPBC_Optimize_IBE by JPBC
☆22Updated 6 years ago
Alternatives and similar repositories for JPBC_Optimize_IBE
Users that are interested in JPBC_Optimize_IBE are comparing it to the libraries listed below
Sorting:
- Decentralized CP-ABE☆118Updated 7 months ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆282Updated 7 months ago
- ☆55Updated 3 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆37Updated 3 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆53Updated last year
- Attribute-based Encryption☆207Updated 5 years ago
- ☆26Updated 3 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆33Updated 2 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- Electronic anonymous voting system based on paillier algorithm☆16Updated 6 years ago
- 基于访问树构造的属性基加密☆61Updated 3 years ago
- ☆27Updated 6 years ago
- ☆20Updated 3 years ago
- Graduate Project: CP-ABE-Encrypt☆22Updated 11 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆189Updated 4 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- 对称可搜索加密,Cash的实现方案☆18Updated 7 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- ☆62Updated 4 years ago
- ☆13Updated 2 years ago
- 一种基于全同态加密技术的医疗隐私保密系统,是一个较为成熟的项目,公开源代码实现,小组成员如下:王子旭、许嘉晨、夏萌、王宏任☆61Updated 6 years ago
- constant size cp-abe searchable encryptyion scheme☆12Updated 6 years ago
- 变色龙哈希☆25Updated 4 years ago
- Use paillier in FISCO BCOS☆68Updated last year
- Boolean Query SSE schemes☆16Updated 7 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Updated 6 years ago