ranzhao1 / IBE
Identity-Based Encryption
☆19Updated 12 years ago
Alternatives and similar repositories for IBE:
Users that are interested in IBE are comparing it to the libraries listed below
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆82Updated 2 years ago
- C library for bilinear pairings☆26Updated 7 years ago
- A lightweight Key-Policy Attribute-Based Encryption scheme in C++☆20Updated 7 years ago
- Snowshoe - Portable, Secure, Fast Elliptic Curve Math Library in C☆63Updated 6 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Updated last year
- XPIR: Private Information Retrieval for Everyone☆116Updated 3 years ago
- FNR is a small domain block cipher to encrypt small objects ( < 128 bits )☆40Updated 7 years ago
- Proof-of-concept implementation of an identity-based encryption scheme over NTRU lattices☆44Updated 8 years ago
- Library for the Intel SGX SDK with basic helper functions☆18Updated 7 years ago
- Go, C++, and C implementation of a bilinear group and pairing-based cryptography for both embedded and non-embedded systems☆36Updated 2 years ago
- Monomi designer and planner prototype☆14Updated 9 years ago
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- Implementation of the Paillier homomorphic cryptosystem using GMP☆30Updated 2 years ago
- Implementations of a fast Elliptic-curve Digital Signature Algorithm☆173Updated 4 years ago
- Modified version of Percy++ PIR simulation by Goldberg, Devet, et al. These modifications enable PIR over databases that are not synchron…☆9Updated 9 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- PoC of an SGX enclave performing symmetric reencryption☆49Updated 8 years ago
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 3 months ago
- Ximix is a network application offering threshold key generation, signatures, decryption, and a RPC style MixNet☆17Updated 7 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆18Updated 7 years ago
- Implementations of a fast Elliptic-curve Diffie-Hellman primitive☆25Updated 9 years ago
- 基于Miracl的国密算法SM9实现☆73Updated last year
- Pairing-based cryptography for Go☆98Updated 6 years ago
- Tor anonymity network for SGX☆46Updated 5 years ago
- ☆46Updated 10 months ago
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆80Updated 7 years ago
- Implementation of cryptographic program obfuscation☆41Updated 6 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- Mirror of SUPERCOP, the "System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives"☆99Updated 7 years ago