The implementation of Ciphertext Policy Attribute Based Encryption in Java.
☆18Dec 22, 2014Updated 11 years ago
Alternatives and similar repositories for cpabe-java
Users that are interested in cpabe-java are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java implementation of an attribute-based encryption scheme☆18Apr 21, 2016Updated 10 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆191Mar 29, 2021Updated 5 years ago
- constant size cp-abe searchable encryptyion scheme☆12Oct 9, 2018Updated 7 years ago
- 可验证外包加解密的基于密文策略属性加密方案的实验仿真系统(Verifiable Outsourcing CPABE experimental simulation system)☆14Sep 18, 2021Updated 4 years ago
- Attribute-based Encryption☆29Jun 30, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 《Java加密与解密的艺术》第2版☆12Jan 17, 2019Updated 7 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆34Apr 13, 2023Updated 3 years ago
- Java Boneh, Lynn, and Shacham (BLS) Signature Aggregation. Implementation of "Aggregate and Verifiably Encrypted Signatures from Bilinear…☆27Feb 3, 2018Updated 8 years ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- Attribute-based Encryption Schemes☆10Nov 16, 2021Updated 4 years ago
- Java从入门到精通☆11Jun 15, 2018Updated 7 years ago
- 清华学神翻译注释版比特币C++源码☆14Jan 24, 2019Updated 7 years ago
- 毕业论文《基于对抗生成网络的人脸光照变换》的源代码。☆12Apr 29, 2019Updated 7 years ago
- A simple mysql proxy.☆12Oct 23, 2013Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 基于FISCO-BCOS区块链的供应链demo,使用node.js构建后端☆10Jan 28, 2021Updated 5 years ago
- 基于 websocket 的开源聊天室☆16Jul 23, 2018Updated 7 years ago
- Weighted Threshold Signature Benchmark☆15Sep 15, 2023Updated 2 years ago
- 基于netty实现的一个数据库代理服务,可用作动态脱敏系统☆12Feb 16, 2022Updated 4 years ago
- Zero-knowledge Range Proof☆16Nov 16, 2017Updated 8 years ago
- A research & development project to create and deploy a Network-based Intrusion Detection System (IDS) to detect intruders on a distribut…☆12Jan 9, 2019Updated 7 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- HMAC-SHA-512-256 for TweetNacl.js☆21May 28, 2018Updated 7 years ago
- 东南大学自动请假 研究生和本科生☆15Jun 29, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Android RSA加密解密☆15Sep 16, 2015Updated 10 years ago
- Playing around with IDS data in Keras☆13Apr 13, 2020Updated 6 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆21Nov 2, 2020Updated 5 years ago
- Linkable ring signature library☆25Sep 6, 2023Updated 2 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- implement IDS using deep learning☆13May 24, 2019Updated 6 years ago
- The Storj Whitepaper☆29Mar 7, 2024Updated 2 years ago
- 从百度百科爬取中国所有大学校徽☆17Mar 29, 2018Updated 8 years ago
- 🎓 Comparison of different digital image watermarking methods - DCT, DWT, SVD together with hybrids☆16Jan 11, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Private set intersection using garbled bloom filters in semi-honest setting☆26Dec 11, 2015Updated 10 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- 本Python源码是编写的基于开源3D软件MakeHuman的插件。 7_AotuHumanBodyRegistration.py主要功能是输入二维人体图片,通过改变三维人体模型的体态, 并把模型的映射到二维空间,通过轮廓迭代求优算法,得到三维模型与二维图片的配准。 7_A…☆17Apr 12, 2016Updated 10 years ago
- Graduate Project: CP-ABE-Encrypt☆22Sep 27, 2013Updated 12 years ago
- Some framework integration toolkit, some framework functions to supplement, enhance, expand, so that some development and usage become ea…☆18Feb 22, 2024Updated 2 years ago
- 西安西电链融科技有限公司项目,使用零知识证明实现可监管的完全的匿名交易☆19Aug 17, 2019Updated 6 years ago
- Python implementation of MPC threshold signatures☆25Feb 13, 2023Updated 3 years ago