AFGH Proxy Re-Encryption with RELIC (C library)
☆12Mar 5, 2020Updated 6 years ago
Alternatives and similar repositories for afgh-pre-relic
Users that are interested in afgh-pre-relic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆24Jul 6, 2018Updated 7 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- A set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.☆165Updated this week
- ☆11May 7, 2020Updated 5 years ago
- ☆47Aug 3, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- qHooK is very simple python script (dependent on pydbg) which hooks user defined Win32 APIs in any process and monitor then while process…☆21Jan 31, 2015Updated 11 years ago
- Proxy Re-Encryption go implementation☆88Apr 5, 2020Updated 6 years ago
- NuCypher proxy re-encryption library in Python☆28Dec 21, 2017Updated 8 years ago
- An Efficient and Privacy preserving implementation for the Set membership problem using Rsa Accumulators coupled with Commit-Prove-Snark☆12Feb 24, 2024Updated 2 years ago
- ☆17Jun 3, 2022Updated 3 years ago
- ☆14Oct 9, 2024Updated last year
- Zero-knowledge Range Proof☆17Nov 16, 2017Updated 8 years ago
- LHSS is an implementation of lattice-based homomorphic secret sharing.☆12Apr 9, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proxy Re-Encryption library using Bilinear Maps in JavaScript.☆14Feb 7, 2019Updated 7 years ago
- A cryptography library from NICS Lab☆20Jan 22, 2013Updated 13 years ago
- HashWires is a range proof system for credentials issued by a trusted third party.☆20Jan 28, 2022Updated 4 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- NIST's statistical test suite for Random Number Generator (RNG) that apply to GINAR RNG☆18Apr 5, 2019Updated 7 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- A prototype implementation of zero-knowledge proofs of training introduced in eprint:2023/1345☆18Sep 12, 2023Updated 2 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Intercept function calls from Python scripts☆33Mar 2, 2016Updated 10 years ago
- ECNU Undergraduate Dissertation Template 2024☆14Mar 13, 2024Updated 2 years ago
- ☆21Jul 1, 2024Updated last year
- Sublinear-space ZKP system in Rust: a streaming prover that uses only O(√T) memory to commit wires/Z/Q via KZG (BN254) with blocked IFFT …☆49Nov 12, 2025Updated 4 months ago
- Exam summary for Computational Intelligence Lab, ETH Zurich, SS16☆11Jul 6, 2017Updated 8 years ago
- HAL: A Library for Homomorphic Authentication☆23Apr 3, 2017Updated 9 years ago
- DPF and PIR based on DPF in C++☆21Mar 4, 2021Updated 5 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Jul 22, 2022Updated 3 years ago
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline☆21Jul 14, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key…☆27Jan 3, 2019Updated 7 years ago
- SGX protected filesystem demo☆12Jul 28, 2017Updated 8 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- Some experiments with concurrent data structures in Go.☆23May 17, 2012Updated 13 years ago
- Additive homomorphic EC-ElGamal☆29Oct 13, 2020Updated 5 years ago
- A Noir's backend implementation using Gnark☆35Mar 8, 2024Updated 2 years ago
- Recursive unified ORAM☆15Sep 23, 2015Updated 10 years ago