leuitong / MAPCHLinks
Multi-Authority Policy-based Chameleon Hash
☆16Updated 5 years ago
Alternatives and similar repositories for MAPCH
Users that are interested in MAPCH are comparing it to the libraries listed below
Sorting:
- Attribute-based Encryption Schemes☆10Updated 4 years ago
- Welcome to the Partially Decryptable Ciphertext Policy Attribute-Based Encryption (CP-ABE) Scheme! This repo implements a CP-ABE scheme t…☆10Updated 5 months ago
- Attribute-based Encryption☆27Updated 2 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆26Updated 2 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆10Updated 2 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆40Updated 5 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 7 years ago
- multi-authority attribute based encryption☆44Updated 5 years ago
- Multi-party Private Set Union☆18Updated 10 months ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Updated 8 years ago
- Attribute-based Encryption☆207Updated 5 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆219Updated 11 months ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆30Updated 10 months ago
- Efficient and Interactive Zero-Knowledge Proofs☆102Updated last month
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 4 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆11Updated 3 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Updated 10 years ago
- Functional encryption library in Go☆192Updated 2 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Updated 3 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 5 years ago
- 基本已完成状态☆12Updated 6 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆28Updated last year
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆57Updated 2 years ago
- ☆11Updated 5 years ago
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Updated 11 months ago
- ☆15Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 5 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago