An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm
☆26Jul 22, 2022Updated 3 years ago
Alternatives and similar repositories for IB-PRE
Users that are interested in IB-PRE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- ☆11May 7, 2020Updated 5 years ago
- Proxy Re-Encryption go implementation☆89Apr 5, 2020Updated 5 years ago
- This identity based encryption based on weil pairing☆15Jul 22, 2017Updated 8 years ago
- Blockchain demo based on Tendermint☆11Apr 24, 2019Updated 6 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 2 years ago
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆192Mar 29, 2021Updated 4 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks☆12Jun 2, 2022Updated 3 years ago
- iState is a state management package for Hyperledger fabric chaincode. It can be used to perform rich queries on leveldb.☆14Feb 25, 2023Updated 3 years ago
- ☆10May 23, 2023Updated 2 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆285Jan 4, 2025Updated last year
- GDB scripts☆14Nov 30, 2012Updated 13 years ago
- Charm: A Framework for Rapidly Prototyping Cryptosystems☆632Mar 8, 2026Updated 2 weeks ago
- fabric blockchain with medical data using privacy preserving technology☆11Dec 10, 2020Updated 5 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆27May 8, 2023Updated 2 years ago
- Demo of XOR erasure coding.☆10Mar 5, 2017Updated 9 years ago
- Research Advances in the Latest Federal Learning Papers (Updated March 27, 2023)☆14Sep 19, 2023Updated 2 years ago
- Attribute-based Encryption☆29Jun 30, 2023Updated 2 years ago
- A form mailer web service for JavaScript-based websites☆14Updated this week
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- 自己的个人毕设,联邦学习相关,主要是多方安全计算中秘密分享的一种算法实现,以完成不需要第三方的安全隐私传输。(An algorithm implementation of secret sharing in multi-party secure computing to c…☆18Apr 10, 2022Updated 3 years ago
- Script(s) to interact with gp-v2-contracs☆15Jul 31, 2025Updated 7 months ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆16May 5, 2022Updated 3 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- 智能组卷系统☆16Jun 21, 2022Updated 3 years ago
- the golang code of simple pbft consensus implementation☆12Aug 26, 2020Updated 5 years ago
- ☆35Sep 11, 2023Updated 2 years ago
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 5 years ago
- (Keep It) Simple Stupid Database☆10Jul 16, 2017Updated 8 years ago
- A Universal Wallet☆15Dec 14, 2024Updated last year
- Query and manipulate JavaScript objects with JSONPath expressions. Robust JSONPath engine for Node.js.☆12Jan 20, 2024Updated 2 years ago
- A composite Github Action to execute the Kotlin Script with compiler plugin and dependency caching!☆11Dec 15, 2025Updated 3 months ago
- docker hub☆11Nov 13, 2025Updated 4 months ago
- What does the droidcon berlin 2018 community build, 15 minutes at a time?☆11Jun 27, 2018Updated 7 years ago