marcellop71 / mosaic
multi-authority attribute based encryption
☆43Updated 4 years ago
Alternatives and similar repositories for mosaic:
Users that are interested in mosaic are comparing it to the libraries listed below
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆19Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆18Updated 4 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- Attribute-based Encryption☆23Updated last year
- FAME CP-ABE Encryption based on JPBC☆29Updated 5 years ago
- ☆26Updated 6 years ago
- LSSS, ABE☆15Updated 4 years ago
- Decentralized CP-ABE☆114Updated 3 months ago
- Attribute-based Encryption☆195Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆95Updated 3 years ago
- CP-ABE-based-on-ECC-implementation☆11Updated 2 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆11Updated 2 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Updated 5 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc …☆34Updated 3 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆22Updated 2 years ago
- Multi-Authority Policy-based Chameleon Hash☆12Updated 4 years ago
- Pairing-based cryptography for Go☆99Updated 6 years ago
- pairing based cryptography☆13Updated 6 years ago
- Attribute-based Encryption Schemes☆10Updated 3 years ago
- ☆11Updated 4 years ago
- Proxy Re-Encryption go implementation☆84Updated 5 years ago
- Functional encryption library in Go☆177Updated 2 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆11Updated last year
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆39Updated 6 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆31Updated 2 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆51Updated last year
- constant size cp-abe searchable encryptyion scheme☆12Updated 6 years ago