Implemention of Hierarchical Identity-Based Encryption
☆24Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for hibe
Users that are interested in hibe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It is a public-key encryption in which the public key of a user is identity(unique).☆14May 25, 2015Updated 10 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Feb 7, 2024Updated 2 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 10 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Jul 6, 2021Updated 4 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Aug 31, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- mirror for the R package "piratings" https://cran.r-project.org/web/packages/piratings/index.html, calculate dynamic performance ratings…☆14May 17, 2019Updated 7 years ago
- Consensus-level Front-running protection mechanism using Threshold Identity-Based Encryption☆16Jan 9, 2026Updated 4 months ago
- ☆10Nov 30, 2015Updated 10 years ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 4 years ago
- nircd is new ircd intended to decentralize IRC more☆12Dec 5, 2023Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Sep 10, 2024Updated last year
- egg graphql plugin☆10Apr 12, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BGN encryption scheme implementation using Go☆16Sep 5, 2020Updated 5 years ago
- Testing schnorr signature scheme with a naive python implementation☆12Jul 8, 2018Updated 7 years ago
- Golang implementation of the Named Data Networking protocol stack☆32May 14, 2026Updated last week
- A series of animation challenges in React Native.☆16Jun 22, 2018Updated 7 years ago
- Fully decentralized p2p IRC for your terminal☆15Jun 2, 2022Updated 3 years ago
- ☆20May 21, 2014Updated 12 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 8 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- Threshold Cryptography Golang Library☆19Jul 25, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 6 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- message signing and verifying for Lightning Network☆10Jan 6, 2023Updated 3 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- ☆41Jun 27, 2022Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 5 years ago
- Polkadot Protocol Conformance Tests☆10May 22, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago
- ☆11Feb 13, 2020Updated 6 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- Rust library implementing the Toorani-Beheshti signcryption scheme☆13Aug 15, 2023Updated 2 years ago
- ☆13Dec 30, 2023Updated 2 years ago