lorenzogentile404 / feldman-verifiable-secret-sharingLinks
☆10Updated 5 years ago
Alternatives and similar repositories for feldman-verifiable-secret-sharing
Users that are interested in feldman-verifiable-secret-sharing are comparing it to the libraries listed below
Sorting:
- Efficient Dynamic Proof of Retrievability☆14Updated last year
- HaimerlNikolas / Advancing-Blockchain-Based-Federated-Learning-Through-Verifiable-Off-Chain-Computations☆13Updated 3 years ago
- Implemented the PBFT Consensus algorithm. PBFT is a fault tolerant algorithm which reaches consensus even having n/3 faulty nodes☆23Updated 5 years ago
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆12Updated last year
- A blockchain interoperability solution for permissioned blockchain networks based on a publish/subscribe pattern.☆26Updated 3 years ago
- Matlab source code for Experience and Reputation models in the Trust Platform☆12Updated 8 years ago
- ☆35Updated 6 years ago
- BlockSim: An Extensible Simulation Tool forBlockchain Systems☆97Updated 3 years ago
- Python impl of VRF's.☆19Updated 2 years ago
- This repository contains Trustchain (Blockchain) simulations built with OMNeT++☆26Updated 5 years ago
- A Blockchain-based reputed access control system in IoT☆16Updated 4 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆15Updated 3 years ago
- SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning☆60Updated 2 years ago
- ☆10Updated 5 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆40Updated 4 years ago
- Source code for the ICDE22 paper "vChain+: Optimizing Verifiable Blockchain Boolean Range Queries"☆21Updated 2 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- Trust management model in IoT☆16Updated 4 years ago
- Using the ns-3 simulator to implement wireless nodes of blockchain and analyse its performance in terms of transaction throughput, mining…☆12Updated 5 years ago
- A simple Python implementation of threshold BLS signatures.☆41Updated last year
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 3 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Updated 3 weeks ago
- Fast Blockchain Simulations for Large-scale Peer-to-Peer Networks☆81Updated 2 years ago
- Network simulation for PBFT (Practical Byzantine Fault Tolerance) consensus algorithm in Python☆20Updated 4 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- This is the repository to host the code for hslang parsing and code generation.☆20Updated 3 years ago
- ☆56Updated 3 years ago
- An efficient implementation of the PHANTOM (GhostDAG) block-DAG protocol, complete with a block-DAG network simulation framework and othe…☆46Updated 3 years ago
- Attribute-based Encryption☆206Updated 5 years ago