An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm
☆26Jul 22, 2022Updated 3 years ago
Alternatives and similar repositories for IB-PRE
Users that are interested in IB-PRE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- Re-encryption by proxy and (additive) homomorphic encryption☆13Oct 10, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 3 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆23Jul 6, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago
- A cryptography library from NICS Lab☆20Jan 22, 2013Updated 13 years ago
- This repository aims to provide a curated list of research papers focusing on Blockchain-based data sharing☆14Nov 25, 2023Updated 2 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆297Dec 9, 2022Updated 3 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆192Mar 29, 2021Updated 5 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 3 years ago
- SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks☆12Jun 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Identity-Based Encryption☆19Oct 18, 2012Updated 13 years ago
- Repo for Live Coding at Droidcon Berlin☆10Sep 5, 2017Updated 8 years ago
- ☆10May 23, 2023Updated 2 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆285Jan 4, 2025Updated last year
- Latex template for poster☆12Sep 6, 2023Updated 2 years ago
- Charm: A Framework for Rapidly Prototyping Cryptosystems☆634Mar 8, 2026Updated last month
- fabric blockchain with medical data using privacy preserving technology☆11Dec 10, 2020Updated 5 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆27May 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Feb 28, 2019Updated 7 years ago
- Nearest Neighbor Search in High Dimensional Spaces☆13Nov 18, 2015Updated 10 years ago
- Attribute-based Encryption☆29Jun 30, 2023Updated 2 years ago
- A form mailer web service for JavaScript-based websites☆14Apr 1, 2026Updated last week
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- VANETsim: A simulator for security and privacy concepts in VANETs (Important note: The VANETsim project is closed. The software is no lon…☆25Apr 4, 2017Updated 9 years ago
- A hyperledger fabric generic network with production ready components to be used as a reference or starting point☆20Oct 16, 2021Updated 4 years ago
- It is a public-key encryption in which the public key of a user is identity(unique).☆14May 25, 2015Updated 10 years ago
- 自己的个人毕设,联邦学习相关,主要是多方安全计算中秘密分享的一种算法实现,以完成不需要第三方的安全隐私传输。(An algorithm implementation of secret sharing in multi-party secure computing to c…☆18Apr 10, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Example repository for Veramo NodeJS Tutorial☆12Jun 26, 2024Updated last year
- Script(s) to interact with gp-v2-contracs☆15Jul 31, 2025Updated 8 months ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆16May 5, 2022Updated 3 years ago
- 智能组卷系统☆16Jun 21, 2022Updated 3 years ago
- ☆35Sep 11, 2023Updated 2 years ago
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 5 years ago
- android ETH signer library to be used by uport app and sdk☆10Feb 1, 2021Updated 5 years ago