taoxinyi / Proxy-Re-encryption-Demo
python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing
☆21Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Proxy-Re-encryption-Demo
- A file encryption application based on the Identity-based proxy re-encryption☆15Updated 5 years ago
- ☆11Updated 4 years ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆17Updated 5 years ago
- This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key…☆25Updated 5 years ago
- multi-authority attribute based encryption☆38Updated 4 years ago
- Java implementation of an attribute-based encryption scheme☆19Updated 8 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆16Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆47Updated 5 years ago
- Proxy Re-Encryption go implementation☆80Updated 4 years ago
- ☆23Updated 5 years ago
- FAME CP-ABE Encryption based on JPBC☆27Updated 4 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆34Updated 5 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆17Updated 4 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆52Updated 7 months ago
- LSSS, ABE☆14Updated 3 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Updated 8 years ago
- Decentralized CP-ABE☆106Updated last month
- A Hyperledger Fabric Based Access Control system to mediate access control flow from centralized applications.☆46Updated 2 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆16Updated 6 years ago
- CP-ABE-based-on-ECC-implementation☆10Updated 2 years ago
- fabric blockchain with medical data using privacy preserving technology☆12Updated 3 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆38Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆18Updated 4 years ago
- An implementation of Identity-based proxy re-encryption scheme, due to Green and Ateniese, using Charm☆23Updated 2 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆48Updated 8 months ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆53Updated 4 years ago
- TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Distributed Keygen☆26Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆93Updated 3 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆29Updated 3 years ago
- Personal Data Management business logic written in Smart Contracts☆19Updated 2 years ago