xygdys / Dory-BFT-ConsensusLinks
Implementation of two BFT consensus protocols
☆18Updated 2 years ago
Alternatives and similar repositories for Dory-BFT-Consensus
Users that are interested in Dory-BFT-Consensus are comparing it to the libraries listed below
Sorting:
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 4 years ago
- information-theoretic asynchronous BFT☆20Updated last year
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 5 years ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 4 years ago
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆57Updated 2 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 5 years ago
- BEAT: Asynchronous BFT Made Practical☆17Updated 5 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Updated 7 years ago
- Attribute-based Encryption☆207Updated 5 years ago
- A Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature on Blockchain☆17Updated 5 years ago
- Publicly Accountable Fine-Grained Blockchain Rewriting in Permissionless Setting☆17Updated 3 years ago
- The Honey Badger of BFT Protocols☆143Updated 3 years ago
- ☆215Updated last month
- Multi-Authority Policy-based Chameleon Hash☆16Updated 5 years ago
- ☆62Updated 4 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- Post-quantum Lattice-based Multi-authority Ciphertext-Policy Attribute-Based Encryption☆26Updated 2 years ago
- A simple implementation of HotStuff consensus protocol☆18Updated 5 years ago
- ☆27Updated 7 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- Functional encryption library in Go☆192Updated 2 years ago
- Decentralized CP-ABE☆118Updated 11 months ago
- ☆22Updated 3 months ago
- Proxy Re-Encryption go implementation☆89Updated 5 years ago
- pairing based cryptography☆16Updated 7 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆56Updated 5 years ago
- Go version of the Pedersen commitment scheme☆14Updated 5 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- The Pairing-based Crypto library☆260Updated 5 months ago
- ☆11Updated 3 years ago