urarik / CP-ABE-based-on-ECC-implementationView external linksLinks
CP-ABE-based-on-ECC-implementation
☆11Apr 29, 2022Updated 3 years ago
Alternatives and similar repositories for CP-ABE-based-on-ECC-implementation
Users that are interested in CP-ABE-based-on-ECC-implementation are comparing it to the libraries listed below
Sorting:
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆23Mar 27, 2023Updated 2 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆27May 8, 2023Updated 2 years ago
- ☆10Jun 6, 2021Updated 4 years ago
- CP-ABE-Blockchain experiments☆16Jul 4, 2024Updated last year
- We defined the interfaces of four Python classes, namely ABE, Authority, User, and init, using the Charm-Crypto framework.☆11Apr 1, 2023Updated 2 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Apr 13, 2023Updated 2 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- ☆11May 7, 2020Updated 5 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆37Jan 12, 2019Updated 7 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Nov 23, 2017Updated 8 years ago
- Decentralized CP-ABE☆119Jan 14, 2025Updated last year
- Post-quantum cryptography based on lattices☆10Apr 26, 2024Updated last year
- Attribute-based Encryption☆206Jul 31, 2020Updated 5 years ago
- This repository includes the codes and files related to the paper titled "An Unsupervised Learning Based Approach for Mining Attribute Ba…☆10Sep 16, 2021Updated 4 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- Example scripts working with Mininet network emulator☆10Dec 3, 2016Updated 9 years ago
- 代码审计关键词扫描工具☆11Apr 29, 2024Updated last year
- ☆10Jan 24, 2022Updated 4 years ago
- Cryptographic accumulator☆10Mar 8, 2018Updated 7 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- This website enables users to select fruits online. (Final project of web application development).☆10Sep 25, 2023Updated 2 years ago
- 教师信息管理系统 TIMS☆11Apr 16, 2021Updated 4 years ago
- 热门框架/组件/服务漏洞的描述/利用/修复☆12Apr 13, 2023Updated 2 years ago
- ☆14Dec 8, 2021Updated 4 years ago
- A fuzzing environment for RL, based on Gym and AFL.☆13Dec 19, 2020Updated 5 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Multi-Authority Policy-based Chameleon Hash☆15Dec 2, 2020Updated 5 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Apr 4, 2016Updated 9 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Jun 17, 2019Updated 6 years ago
- e-Health Record management system using Blockchain and IPFS☆11Sep 13, 2020Updated 5 years ago
- AFGH Proxy Re-Encryption with RELIC (C library)☆12Mar 5, 2020Updated 5 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- Lập trình Python cho Máy học☆15Dec 25, 2021Updated 4 years ago
- rsa算法,实现签名,验签,公钥加密和私钥解密☆13Jan 31, 2018Updated 8 years ago
- 基于分布式身份的微贷联合风控平台☆13Jan 4, 2023Updated 3 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆24Nov 16, 2023Updated 2 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆19Dec 13, 2020Updated 5 years ago