nikosft / IB-PRE-APPLinks
A file encryption application based on the Identity-based proxy re-encryption
☆16Updated 6 years ago
Alternatives and similar repositories for IB-PRE-APP
Users that are interested in IB-PRE-APP are comparing it to the libraries listed below
Sorting:
- ☆11Updated 5 years ago
- Attribute-based Encryption☆207Updated 5 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Updated 3 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- multi-authority attribute based encryption☆43Updated 4 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆11Updated 3 years ago
- ☆27Updated 6 years ago
- pairing based cryptography☆14Updated 6 years ago
- Decentralized CP-ABE☆116Updated 6 months ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆52Updated last year
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆22Updated 2 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- CP-ABE-based-on-ECC-implementation☆12Updated 3 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆19Updated 7 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆186Updated 4 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆282Updated 7 months ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆54Updated 5 years ago
- Functional encryption library in Go☆185Updated 2 years ago
- Attribute-based Encryption☆26Updated 2 years ago
- Proxy Re-Encryption go implementation☆87Updated 5 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆33Updated 2 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆22Updated 2 years ago
- Personal Data Management business logic written in Smart Contracts☆21Updated 2 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Updated 6 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 3 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14Updated 8 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 4 years ago