A file encryption application based on the Identity-based proxy re-encryption
☆16Nov 23, 2018Updated 7 years ago
Alternatives and similar repositories for IB-PRE-APP
Users that are interested in IB-PRE-APP are comparing it to the libraries listed below
Sorting:
- ☆11May 7, 2020Updated 5 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆24Jul 6, 2018Updated 7 years ago
- Re-encryption by proxy and (additive) homomorphic encryption☆13Oct 10, 2018Updated 7 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 9 years ago
- Proxy Re-Encryption go implementation☆89Apr 5, 2020Updated 5 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- Latex template for poster☆12Sep 6, 2023Updated 2 years ago
- egg graphql plugin☆10Apr 12, 2022Updated 3 years ago
- Demo of XOR erasure coding.☆10Mar 5, 2017Updated 9 years ago
- Digital identity management frame based blockchain's smart contracts of zero knowledge proof☆10Oct 9, 2021Updated 4 years ago
- Implementation of backpropagation algorithm in MATLAB to detect DDOS (Distributed Denial Of Service) Attack in NDN(Named Data Networking)…☆14Mar 8, 2017Updated 8 years ago
- docker hub☆11Nov 13, 2025Updated 3 months ago
- ☆11May 29, 2024Updated last year
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- ☆11Feb 13, 2020Updated 6 years ago
- A python implementation of distributed key generation over secp256k1☆13Nov 27, 2017Updated 8 years ago
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Sep 15, 2025Updated 5 months ago
- A form mailer web service for JavaScript-based websites☆14Updated this week
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Droplet: Decentralized Authorization for IoT Data Streams☆15May 22, 2023Updated 2 years ago
- Testing schnorr signature scheme with a naive python implementation☆12Jul 8, 2018Updated 7 years ago
- 谷歌上网助手Android下载☆13May 4, 2023Updated 2 years ago
- Privacy mechanisms for decentralized fingerprint-based authentication☆13Aug 20, 2020Updated 5 years ago
- ICMP Smurf Attack in python☆13Feb 9, 2020Updated 6 years ago
- Coreseek 修复在新版 GCC 下编译错误☆14Mar 20, 2015Updated 10 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Dec 10, 2020Updated 5 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Attribute-based Access Control over Named Data Networking☆17Jul 18, 2025Updated 7 months ago
- the golang code of simple pbft consensus implementation☆12Aug 26, 2020Updated 5 years ago
- OPHELib is an optimized library for partially homomorphic encryption. It currently provides an implementation of the Paillier encryption …☆15May 29, 2019Updated 6 years ago
- IBE implementation based on jpbc☆17Jan 9, 2022Updated 4 years ago
- AFGH Proxy Re-Encryption with RELIC (C library)☆12Mar 5, 2020Updated 6 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- Consensus-level Front-running protection mechanism using Threshold Identity-Based Encryption☆16Jan 9, 2026Updated last month
- Identity-Based Encryption☆19Oct 18, 2012Updated 13 years ago
- Demo, tutorial, and benchmarks for the SAPL policy engine☆16Feb 26, 2026Updated last week
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 5 years ago