AFGH Proxy Re-Encryption with RELIC (C library)
☆12Mar 5, 2020Updated 6 years ago
Alternatives and similar repositories for afgh-pre-relic
Users that are interested in afgh-pre-relic are comparing it to the libraries listed below
Sorting:
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆24Jul 6, 2018Updated 7 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- ☆11May 7, 2020Updated 5 years ago
- ☆47Aug 3, 2020Updated 5 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- qHooK is very simple python script (dependent on pydbg) which hooks user defined Win32 APIs in any process and monitor then while process…☆21Jan 31, 2015Updated 11 years ago
- Proxy Re-Encryption go implementation☆89Apr 5, 2020Updated 5 years ago
- An Efficient and Privacy preserving implementation for the Set membership problem using Rsa Accumulators coupled with Commit-Prove-Snark☆12Feb 24, 2024Updated 2 years ago
- ☆17Jun 3, 2022Updated 3 years ago
- ☆14Oct 9, 2024Updated last year
- Zero-knowledge Range Proof☆17Nov 16, 2017Updated 8 years ago
- LHSS is an implementation of lattice-based homomorphic secret sharing.☆12Apr 9, 2020Updated 5 years ago
- Proxy Re-Encryption library using Bilinear Maps in JavaScript.☆14Feb 7, 2019Updated 7 years ago
- NIST's statistical test suite for Random Number Generator (RNG) that apply to GINAR RNG☆18Apr 5, 2019Updated 6 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- A prototype implementation of zero-knowledge proofs of training introduced in eprint:2023/1345☆18Sep 12, 2023Updated 2 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- Intercept function calls from Python scripts☆33Mar 2, 2016Updated 10 years ago
- ☆13Aug 4, 2022Updated 3 years ago
- ECNU Undergraduate Dissertation Template 2024☆14Mar 13, 2024Updated 2 years ago
- Transform encryption library for Scala☆36Updated this week
- Mixtures of von Mises-Fisher Distributions☆12Mar 23, 2015Updated 10 years ago
- Exam summary for Computational Intelligence Lab, ETH Zurich, SS16☆11Jul 6, 2017Updated 8 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆27May 8, 2023Updated 2 years ago
- DPF and PIR based on DPF in C++☆21Mar 4, 2021Updated 5 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Jul 22, 2022Updated 3 years ago
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline☆21Jul 14, 2023Updated 2 years ago
- Pilatus extends the Talos Framework for Android Applications and/or Smartphone-as-Gateway IoT Applications. Pilatus employs partial homom…☆18Dec 15, 2017Updated 8 years ago
- This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key…☆27Jan 3, 2019Updated 7 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- Some experiments with concurrent data structures in Go.☆23May 17, 2012Updated 13 years ago
- Additive homomorphic EC-ElGamal☆30Oct 13, 2020Updated 5 years ago
- A Noir's backend implementation using Gnark☆35Mar 8, 2024Updated 2 years ago
- Recursive unified ORAM☆15Sep 23, 2015Updated 10 years ago
- 批量下载百度图片的脚本☆15Aug 8, 2016Updated 9 years ago
- SysX☆36Mar 27, 2024Updated last year
- A repo about web server with gin framwork.☆22Jan 10, 2024Updated 2 years ago
- Mantis: Reactive Programmable Switches (SIGCOMM 2020)☆22Aug 21, 2020Updated 5 years ago