15097383012's Stars
taoxinyi/eff-pre
Efficient Proxy Re-encryption without pairing in JavaScript
Rodrigo-D/genRSA-v2.1
RSA tool - key generation, attacks, encryption, signature and primality test.
alonmuroch/dkg-cli
JHUISI/charm
Charm: A Framework for Rapidly Prototyping Cryptosystems
PreethiAnnJacob/Proxy-Re-encryption
Implementation of Proxy Re-Encryption Schemes in Go language
syedhaideralizaidi/Secure-keyword-using-bit-string-signatures-in-Blockchain-
Data privacy is one of the biggest difficulties that every organization faces nowadays. All organizations should provide security protections on personal data against unauthorized access and modifications of any data. Healthcare is such an example where patient data should be handled properly and the leakage or alteration of this data assists in a huge privacy-neglecting issue. Immutability can be provided by adopting the blockchain technology in healthcare. Encryption is a key baseline to data privacy protection. This code introduces a new approach to secure keyword search over encrypted data in the blockchain. In this code, we propose the implementation of the bit-string signatures in the design of a data structure to secure search and access data while hiding the search pattern and share the patient data records between authorized organizations, while ensuring the privacy and im- mutability of the data. Besides, the secure cryptographic protocol - proxy re-encryption is applied to support proper encryption and decryption without revealing the keys and access control over secret data. The goal of this code is the evaluation of the keyword search using bloom filters over encrypted data in the blockchain.
secomuib/HighlyPrivateManagementSystemForDigitalCOVID-19Certificates
Highly private blockchain-based management system for Digital COVID-19 Certificates DApp, using a proxy re-encryption service.
BOBBYUAN/CS297
Proxy Re-Encryption in BlockChain
getamis/alice
Hierarchical Threshold Signature Scheme
str4d/ed25519-java
Pure Java implementation of EdDSA
NAiZ123/jf-dkg
dfinity-side-projects/dkg
distributed key generation in JS
nikosft/IB-PRE-APP
A file encryption application based on the Identity-based proxy re-encryption
nucypher/zerodb-afgh-pre
AFGH Proxy re-encryption for ZeroDB
gnosis/pydkg
A python implementation of distributed key generation over secp256k1
bipinkh/SecretSharing
A repo showing the implementation of Shamir's Secret Sharing Algorithm as well as the file sharing algorithm that uses randomly generated AES key to encrypt a file, and make chunks of the "Encrypted AES Key + Encrypted File" to be distributed in network.
ChristianMct/thresh-paillier-wo-td
Implementation of a Threshold Paillier Cryptosystem distributed key generation protocol
DivyanshRoy/Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC-
Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.
DivyanshRoy/ProxyReEncryption-RSA-AES-
This Java based project contains code for Proxy Re-Encryption using RSA+AES. The message is encrypted at the Sender level with an AES Key. The AES Key is encrypted with the Sender's Public RSA Key. The AES Key is then Re-Encrypted at the Server so that it can be decrypted by the Reciever's Private RSA Key. After the decryption of the AES Key at the Reciever level the ciphertext is decrypted to obtain the original message.
nucypher/nube
anxinzhou/dkg-go
only for experiment test
thashimoto1998/dkgExample
BlockClusterApp/blockcluster-node
Official BlockCluster Node.js SDK for Dynamo, Paymeter, Hyperion and Platform APIs
fabifrank/pyUmbralDocker
Docker Container to play with the pyUmbral implementation of Nucypher (Proxy Re-Encryption).
cygnusv/ntrureencrypt
Prototype implementation of NTRUReEncrypt in Java
taoxinyi/Proxy-Re-encryption-Demo
python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing
IronCoreLabs/recrypt-node-binding
Bindings from recrypt-rs to work with NodeJS
IronCoreLabs/recrypt-rs
A set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.
itering/dkms-demo
DKMS Demo is to demonstrate the solution of Itering's Distributed Key Management System using two-party ecdsa and proxy re-encryption
winderica/PreDAuth
Decentralized authorization system based on Hyperledger Fabric and Proxy ReEncryption