peterstefanov / paillierLinks
Java implementation of Paillier algorithm. This is one of the few known system that preserves additive homomorphic properties. JCA PaillierProvider follows the requirements of Java Cryptography Architecture Reference Guide for Java Platform Standard Edition 6 issued by Oracle.
☆11Updated 6 years ago
Alternatives and similar repositories for paillier
Users that are interested in paillier are comparing it to the libraries listed below
Sorting:
- A Java implementation of Paillier cryptosystem.☆35Updated 6 years ago
- A Java library for Paillier partially homomorphic encryption.☆81Updated 7 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆53Updated 2 weeks ago
- ☆38Updated 6 years ago
- Use paillier in FISCO BCOS☆68Updated last year
- Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol☆12Updated 9 years ago
- Java implementation of an attribute-based encryption scheme☆19Updated 9 years ago
- ☆16Updated 5 years ago
- Order-preserving encryption in Java☆28Updated 4 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Updated 9 years ago
- Additive homomorphic EC-ElGamal☆29Updated 4 years ago
- Electronic anonymous voting system based on paillier algorithm☆16Updated 6 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆185Updated last year
- MIT开发的支持整数向量的同态加密 支持向量的加法,乘法和内积☆15Updated 5 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆52Updated last year
- Client of group-signature and ring-signature☆41Updated 2 years ago
- ☆223Updated 4 months ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆96Updated 2 years ago
- Private Information Retrieval protocol☆45Updated 4 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- ☆9Updated 5 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- Java implementations of two order-preserving encryption algorithms.☆36Updated 11 months ago
- The compiler for ObliVM☆65Updated 4 years ago
- The OPE lib extracted from CryptoDb☆17Updated 9 years ago
- Shamir Secret Sharing in Java☆72Updated 3 years ago
- Implementations of Private Set Intersection Protocols☆182Updated this week