An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm
☆26Jul 22, 2022Updated 3 years ago
Alternatives and similar repositories for IB-PRE
Users that are interested in IB-PRE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- ☆11May 7, 2020Updated 5 years ago
- Proxy Re-Encryption go implementation☆87Apr 5, 2020Updated 6 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- This identity based encryption based on weil pairing☆15Jul 22, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 3 years ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- Attribute-based Encryption☆208Jul 31, 2020Updated 5 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 10 years ago
- This repository aims to provide a curated list of research papers focusing on Blockchain-based data sharing☆14Nov 25, 2023Updated 2 years ago
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆297Dec 9, 2022Updated 3 years ago
- DiffieHellman, Elgamal, ECDSA & STS with elliptic curve in python☆20Aug 25, 2016Updated 9 years ago
- An implementation of the "Flow-Based Image Abstraction" article methods by Henry Kang et al.☆10May 9, 2017Updated 8 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆192Mar 29, 2021Updated 5 years ago
- CP-ABE-based-on-ECC-implementation☆11Apr 29, 2022Updated 4 years ago
- SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks☆12Jun 2, 2022Updated 3 years ago
- Identity-Based Encryption☆19Oct 18, 2012Updated 13 years ago
- Repo for Live Coding at Droidcon Berlin☆10Sep 5, 2017Updated 8 years ago
- AFGH Proxy Re-Encryption with RELIC (C library)☆12Mar 5, 2020Updated 6 years ago
- ☆10May 23, 2023Updated 2 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆285Jan 4, 2025Updated last year
- Charm: A Framework for Rapidly Prototyping Cryptosystems☆637Apr 19, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- fabric blockchain with medical data using privacy preserving technology☆11Dec 10, 2020Updated 5 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- FM-index is the fastest full text search algorithm using a compressed index file. This is FM-index for JSX/JS/AMD/Common.js.☆11Nov 9, 2013Updated 12 years ago
- Implementation of DataFly for K-anonymity, and implemented Laplace Mechanism and Exponential Mechanism for Differential Privacy☆40Feb 28, 2019Updated 7 years ago
- Nearest Neighbor Search in High Dimensional Spaces☆13Nov 18, 2015Updated 10 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆28May 8, 2023Updated 2 years ago
- Demo of XOR erasure coding.☆10Mar 5, 2017Updated 9 years ago
- Research Advances in the Latest Federal Learning Papers (Updated March 27, 2023)☆14Sep 19, 2023Updated 2 years ago
- Attribute-based Encryption☆29Jun 30, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- VANETsim: A simulator for security and privacy concepts in VANETs (Important note: The VANETsim project is closed. The software is no lon…☆25Apr 4, 2017Updated 9 years ago
- It is a public-key encryption in which the public key of a user is identity(unique).☆14May 25, 2015Updated 10 years ago
- 自己的个人毕设,联邦学习相关,主要是多方安全计算中秘密分享的一种算法实现,以完成不需要第三方的安全隐私传输。(An algorithm implementation of secret sharing in multi-party secure computing to c…☆19Apr 10, 2022Updated 4 years ago
- Example repository for Veramo NodeJS Tutorial☆12Jun 26, 2024Updated last year
- Script(s) to interact with gp-v2-contracs☆15Jul 31, 2025Updated 9 months ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆16May 5, 2022Updated 4 years ago