xygdys / Dory-BFT-ConsensusLinks
Implementation of two BFT consensus protocols
☆17Updated last year
Alternatives and similar repositories for Dory-BFT-Consensus
Users that are interested in Dory-BFT-Consensus are comparing it to the libraries listed below
Sorting:
- A simple implementation of HotStuff consensus protocol☆18Updated 5 years ago
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆52Updated 2 years ago
- information-theoretic asynchronous BFT☆20Updated 11 months ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 3 years ago
- BEAT: Asynchronous BFT Made Practical☆16Updated 5 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆35Updated 3 years ago
- ☆202Updated last week
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 4 years ago
- ☆62Updated 4 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- Functional encryption library in Go☆184Updated 2 years ago
- Sample implementation of PBFT consensus algorithm☆229Updated 3 years ago
- The Honey Badger of BFT Protocols☆142Updated 3 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- Go version of the Pedersen commitment scheme☆14Updated 5 years ago
- Proxy Re-Encryption go implementation☆87Updated 5 years ago
- ☆311Updated 3 weeks ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- Attribute-based Encryption☆206Updated 4 years ago
- A simple Python implementation of threshold BLS signatures.☆41Updated last year
- A Hyperledger Fabric Based Access Control system to mediate access control flow from centralized applications.☆46Updated 3 years ago
- Decentralized CP-ABE☆115Updated 6 months ago
- Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.☆18Updated 6 years ago
- ☆23Updated last year
- bbs04 signature in golang☆16Updated 6 years ago
- ☆24Updated 4 years ago
- ☆11Updated 5 years ago
- 《一种面向区块链的优化PBFT共识算法》基础源代码☆64Updated 2 years ago