NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io
☆300Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for pyUmbral
Users that are interested in pyUmbral are comparing it to the libraries listed below
Sorting:
- Threshold Access Control (TACo) Node Runtime☆710Updated this week
- Documentation of the Umbral PRE cryptosystem☆30May 15, 2018Updated 7 years ago
- NuCypher proxy re-encryption library in Python☆28Dec 21, 2017Updated 8 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Mar 8, 2016Updated 9 years ago
- Umbral implementation in Golang☆43Sep 13, 2018Updated 7 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆24Jul 6, 2018Updated 7 years ago
- Privacy layer for blockchain and decentralized applications based on proxy re-encryption☆67Sep 7, 2021Updated 4 years ago
- NuCypher fully homomorphic encryption (NuFHE) library implemented in Python☆455Jun 21, 2022Updated 3 years ago
- Proxy Re-Encryption go implementation☆89Apr 5, 2020Updated 5 years ago
- Ethereum (solidity) code for nucypher-kms☆18Apr 10, 2018Updated 7 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- Numerology: Optimized ECC arithmetic library for secp256k1 in Solidity☆13Nov 2, 2018Updated 7 years ago
- ☆15May 27, 2021Updated 4 years ago
- Upstream research, development and discussion relating to the NuCypher protocol and economic design☆13Feb 1, 2020Updated 6 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆26Jul 22, 2022Updated 3 years ago
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- A set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.☆164Feb 3, 2026Updated 3 weeks ago
- EIP1559 Analysis☆22Jul 4, 2020Updated 5 years ago
- A scheme that produces a zero-knowledge proof of correctness for an MPC computation. The scheme allows anyone, particularly someone exter…☆26Feb 20, 2024Updated 2 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Jan 3, 2019Updated 7 years ago
- ☆21Jun 28, 2022Updated 3 years ago
- A curated list of resources, links, projects, tools and hacks on, for and around Raiden!☆15Sep 25, 2021Updated 4 years ago
- Umbral implementation in Rust☆55Jan 29, 2024Updated 2 years ago
- Sher's crypto library☆10Jan 12, 2021Updated 5 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key…☆27Jan 3, 2019Updated 7 years ago
- Akropolis C2FC Implementation (early stage)☆14Aug 5, 2019Updated 6 years ago
- Curated list of rollups on Ethereum and their security guarantees.☆13Feb 3, 2021Updated 5 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- A Golang implementation of Bitcoin☆44Apr 7, 2022Updated 3 years ago
- 📄 Counterfactual: Generalized State Channels Paper☆57Aug 7, 2018Updated 7 years ago
- the kitsunet js implementation☆18Dec 9, 2022Updated 3 years ago
- A pure rust implementation of Arcturus proofs for confidential transactions.☆12Sep 28, 2025Updated 5 months ago
- The Trinity client for the Eth2 network☆14Aug 25, 2020Updated 5 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Distributed Ledger for the people ✊☆13Nov 24, 2019Updated 6 years ago
- Re-encryption by proxy and (additive) homomorphic encryption☆13Oct 10, 2018Updated 7 years ago