lbwtorino / Fine-Grained-Blockchain-Rewriting-in-Permissionless-SettingView external linksLinks
Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting
☆17Feb 22, 2022Updated 3 years ago
Alternatives and similar repositories for Fine-Grained-Blockchain-Rewriting-in-Permissionless-Setting
Users that are interested in Fine-Grained-Blockchain-Rewriting-in-Permissionless-Setting are comparing it to the libraries listed below
Sorting:
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Nov 14, 2021Updated 4 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆13Apr 26, 2021Updated 4 years ago
- 变色龙哈希☆25May 11, 2021Updated 4 years ago
- A chameleon hash implementation in GO☆17Jun 3, 2020Updated 5 years ago
- //基于golang重写区块链//☆12Aug 29, 2018Updated 7 years ago
- This repository aims to provide a curated list of research papers focusing on Blockchain-based data sharing☆13Nov 25, 2023Updated 2 years ago
- Welcome to the Partially Decryptable Ciphertext Policy Attribute-Based Encryption (CP-ABE) Scheme! This repo implements a CP-ABE scheme t…☆11Jul 17, 2025Updated 7 months ago
- ☆11Oct 7, 2022Updated 3 years ago
- PVSS & Scrape in rust☆11Aug 14, 2025Updated 6 months ago
- ☆13Oct 9, 2023Updated 2 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Dec 10, 2020Updated 5 years ago
- e-Health Record management system using Blockchain and IPFS☆11Sep 13, 2020Updated 5 years ago
- Research Advances in the Latest Federal Learning Papers (Updated March 27, 2023)☆14Sep 19, 2023Updated 2 years ago
- Python implementation of the HydRand protocol☆18Oct 18, 2022Updated 3 years ago
- ☆18Nov 18, 2019Updated 6 years ago
- Source code for the ICDE22 paper "vChain+: Optimizing Verifiable Blockchain Boolean Range Queries"☆21Feb 21, 2023Updated 2 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- The official implementation for the paper: "FedMLP: Federated Multi-Label Medical Image Classiffcation under Task Heterogeneity", which i…☆22Dec 27, 2024Updated last year
- ☆22Sep 1, 2023Updated 2 years ago
- Secure auditing of Internet services with Intel SGX☆23Apr 30, 2021Updated 4 years ago
- 自制Orange操作系统☆17Feb 9, 2018Updated 8 years ago
- Distributed key generation☆21Aug 16, 2018Updated 7 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- Th3g3ntl3man CTF Writeups☆22Sep 17, 2018Updated 7 years ago
- ☆25Jul 12, 2021Updated 4 years ago
- ☆24Dec 4, 2023Updated 2 years ago
- 对称可搜索加密SWP方案的C++实现☆20May 5, 2021Updated 4 years ago
- Publicly Verifiable Secret Sharing, and more...☆28Nov 19, 2025Updated 2 months ago
- RISC Zero Nova is inherit from Risc Zero but aim to replace STARK with Nova folding scheme☆28Jun 27, 2023Updated 2 years ago
- The library implements a simple Publicly Verifiable Secret Sharing(PVSS) scheme in Rust.☆27Feb 4, 2026Updated 2 weeks ago
- Implementation of the Paillier homomorphic cryptosystem using GMP☆29May 18, 2022Updated 3 years ago
- Verifiable Delay Function (VDF) Implementation in Golang☆25Aug 18, 2019Updated 6 years ago
- ☆26Jan 18, 2023Updated 3 years ago
- Implementation of verifiable delay function.☆25Sep 2, 2020Updated 5 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- 区块链+联邦学习+恶意检测算法☆30Mar 5, 2021Updated 4 years ago
- FAME CP-ABE Encryption based on JPBC☆28Jan 16, 2020Updated 6 years ago
- ☆39Jan 1, 2022Updated 4 years ago
- High-throughput Byzantine consensus on variable bandwidth networks.☆38Jun 7, 2024Updated last year