leuitong / MAPCHLinks
Multi-Authority Policy-based Chameleon Hash
☆16Updated 4 years ago
Alternatives and similar repositories for MAPCH
Users that are interested in MAPCH are comparing it to the libraries listed below
Sorting:
- Welcome to the Partially Decryptable Ciphertext Policy Attribute-Based Encryption (CP-ABE) Scheme! This repo implements a CP-ABE scheme t…☆10Updated last month
- Attribute-based Encryption Schemes☆10Updated 3 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆23Updated 2 years ago
- Attribute-based Encryption☆26Updated 2 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆10Updated 2 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆40Updated 4 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- multi-authority attribute based encryption☆44Updated 4 years ago
- Multi-party Private Set Union☆18Updated 7 months ago
- Attribute-based Encryption☆207Updated 5 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆19Updated 7 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆11Updated 3 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆27Updated 9 years ago
- ☆11Updated 5 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆53Updated last year
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆189Updated 4 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆214Updated 8 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆34Updated 4 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 3 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆27Updated 6 months ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Updated 3 years ago
- ☆20Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆101Updated 4 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆56Updated 5 years ago
- Implementation of Public Key Encryption with Keyword Search☆35Updated 9 years ago
- Proxy Re-Encryption go implementation☆87Updated 5 years ago