lorenzogentile404 / feldman-verifiable-secret-sharing
☆10Updated 4 years ago
Alternatives and similar repositories for feldman-verifiable-secret-sharing:
Users that are interested in feldman-verifiable-secret-sharing are comparing it to the libraries listed below
- Efficient Dynamic Proof of Retrievability☆14Updated last year
- HaimerlNikolas / Advancing-Blockchain-Based-Federated-Learning-Through-Verifiable-Off-Chain-Computations☆13Updated 3 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 4 years ago
- Network simulation for PBFT (Practical Byzantine Fault Tolerance) consensus algorithm in Python☆19Updated 3 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- Multi-Authority Policy-based Chameleon Hash☆12Updated 4 years ago
- BlockSim: An Extensible Simulation Tool forBlockchain Systems☆94Updated 3 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆11Updated last year
- Personal Data Management business logic written in Smart Contracts☆21Updated 2 years ago
- Python impl of VRF's.☆19Updated 2 years ago
- 这是一个基于Paillier同态加密系统的隐私保护SVM模型训练算法。☆16Updated 2 years ago
- A Blockchain-based reputed access control system in IoT☆16Updated 3 years ago
- ☆13Updated 2 years ago
- Implementation of Federated Learning and Blockchain for training machine learning models using a decentralized approach thereby attemptin…☆31Updated 3 years ago
- A blockchain interoperability solution for permissioned blockchain networks based on a publish/subscribe pattern.☆26Updated 3 years ago
- This is the repository to host the code for hslang parsing and code generation.☆21Updated 2 years ago
- 基于同态加密的联邦学习安全聚合系统☆44Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 4 years ago
- 基本已完成状态☆11Updated 5 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆34Updated 3 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- multi-authority attribute based encryption☆43Updated 4 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 2 years ago
- ☆36Updated 6 years ago
- ☆10Updated 4 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆19Updated last year
- Implemented the PBFT Consensus algorithm. PBFT is a fault tolerant algorithm which reaches consensus even having n/3 faulty nodes☆23Updated 4 years ago
- Source codes of solidity-based smart contract, NS, VanetMobiSim in our proposed BCPPA☆7Updated 3 years ago
- SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning☆55Updated 2 years ago
- Privacy-preserving federated learning is distributed machine learning where multiple collaborators train a model through protected gradi…☆29Updated 3 years ago