pairing based cryptography
☆16Sep 17, 2018Updated 7 years ago
Alternatives and similar repositories for CP-ABE
Users that are interested in CP-ABE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- constant size cp-abe searchable encryptyion scheme☆12Oct 9, 2018Updated 7 years ago
- FAME CP-ABE Encryption based on JPBC☆27Jan 16, 2020Updated 6 years ago
- ☆10Jun 6, 2021Updated 4 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Decentralized CP-ABE☆118Jan 14, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆27May 8, 2023Updated 2 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆285Jan 4, 2025Updated last year
- A distributed file system utilizing attribute-based encryption to achieve secure authentication, authorization, storage, and transmission…☆14May 18, 2017Updated 8 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 4 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆37Jan 12, 2019Updated 7 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆192Mar 29, 2021Updated 5 years ago
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆12Apr 1, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Java project for digital watermarking using DCT-DWT-SVD☆24Mar 25, 2018Updated 8 years ago
- ☆56Apr 4, 2022Updated 3 years ago
- find all circuits of a directed graph using johnson's algorithm and java implementation by frank meyer☆18Jul 5, 2018Updated 7 years ago
- Yao's Garbled Circuits (Java/AES)☆10Dec 9, 2013Updated 12 years ago
- Audio Watermarking by DWT-SVD☆26Feb 16, 2019Updated 7 years ago
- Source code for the ICDE22 paper "vChain+: Optimizing Verifiable Blockchain Boolean Range Queries"☆21Feb 21, 2023Updated 3 years ago
- Java implementation of Paillier algorithm. This is one of the few known system that preserves additive homomorphic properties. JCA Pailli…☆11Jan 29, 2019Updated 7 years ago
- ☆24May 16, 2013Updated 12 years ago
- The OpenABE library - open source cryptographic library with attribute-based encryption implementations in C/C++☆274May 8, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 控制权与所有权一致的企业级分布式账本☆16Aug 2, 2021Updated 4 years ago
- Sample code for Atomic Crosschain Transactions☆21Dec 17, 2021Updated 4 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 3 years ago
- File Syncing with encryption and compression for the cloud with local folders and WebDAV backends. Based on JFileSync - hence the name. A…☆31Updated this week
- An example usage as a standalone CLI of https://github.com/KZen-networks/multi-party-ecdsa library which is a Rust implementation of {t,n…☆37Feb 18, 2026Updated last month
- Implemented the PBFT Consensus algorithm. PBFT is a fault tolerant algorithm which reaches consensus even having n/3 faulty nodes☆23May 8, 2020Updated 5 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Nov 23, 2017Updated 8 years ago
- 150.JSP+SQL车辆管理系统☆26Nov 13, 2021Updated 4 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- JOYA(Joy Agents) is a governance framework for teams of AI agents. It provides the rules, structure, and accountability mechanisms that l…☆115Mar 4, 2026Updated 3 weeks ago
- A Robust Digital Image Watermarking Scheme Using Hybrid DWT-DCT-SVD Technique☆26May 5, 2017Updated 8 years ago
- ☆16Apr 29, 2020Updated 5 years ago
- 基本已完成状态☆11Oct 22, 2019Updated 6 years ago
- Network Public Opinion Monitoring System☆15Apr 1, 2021Updated 4 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Jun 17, 2019Updated 6 years ago
- Learning how to bulletproofs☆38Dec 22, 2018Updated 7 years ago