leuitong / MAPCHLinks
Multi-Authority Policy-based Chameleon Hash
☆16Updated 5 years ago
Alternatives and similar repositories for MAPCH
Users that are interested in MAPCH are comparing it to the libraries listed below
Sorting:
- Welcome to the Partially Decryptable Ciphertext Policy Attribute-Based Encryption (CP-ABE) Scheme! This repo implements a CP-ABE scheme t…☆11Updated 6 months ago
- Attribute-based Encryption Schemes☆10Updated 4 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆27Updated 2 years ago
- Attribute-based Encryption☆28Updated 2 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆11Updated 2 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 7 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 5 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Updated 8 years ago
- Multi-party Private Set Union☆18Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆49Updated 7 years ago
- multi-authority attribute based encryption☆43Updated 5 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12Updated 3 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Updated 3 years ago
- TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Distributed Keygen☆28Updated last year
- Private set intersection using garbled bloom filters in semi-honest setting☆26Updated 10 years ago
- Functional encryption library in Go☆194Updated 2 years ago
- Attribute-based Encryption☆207Updated 5 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆217Updated last year
- 基本已完成状态☆11Updated 6 years ago
- Attribute-based Access Control over Named Data Networking☆17Updated 6 months ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 5 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆36Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆36Updated 3 years ago
- ☆11Updated 5 years ago
- ☆15Updated last year
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 4 years ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Updated last year