xygdys / Dory-BFT-ConsensusLinks
Implementation of two BFT consensus protocols
☆18Updated 2 years ago
Alternatives and similar repositories for Dory-BFT-Consensus
Users that are interested in Dory-BFT-Consensus are comparing it to the libraries listed below
Sorting:
- information-theoretic asynchronous BFT☆20Updated last year
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 4 years ago
- A simple implementation of HotStuff consensus protocol☆18Updated 5 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 5 years ago
- BEAT: Asynchronous BFT Made Practical☆17Updated 5 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 5 years ago
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆57Updated 2 years ago
- ☆216Updated this week
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆26Updated 2 years ago
- ☆62Updated 5 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 5 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 5 years ago
- Go version of the Pedersen commitment scheme☆15Updated 5 years ago
- ☆11Updated 5 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Updated 2 years ago
- The Honey Badger of BFT Protocols☆143Updated 3 years ago
- Proxy Re-Encryption go implementation☆89Updated 5 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 7 years ago
- bbs04 signature in golang☆16Updated 7 years ago
- Multi-Authority Policy-based Chameleon Hash☆16Updated 5 years ago
- Sample implementation of PBFT consensus algorithm☆233Updated 4 years ago
- 基于访问树构造的属性基加密☆65Updated 3 years ago
- ☆22Updated last year
- A simple consensus of PBFT☆13Updated 6 years ago
- ☆22Updated 4 months ago
- ☆11Updated last year
- Functional encryption library in Go☆193Updated 2 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- ☆11Updated 3 years ago