Ahmad1234567 / provable-data-possessionLinks
Automatically exported from code.google.com/p/provable-data-possession
☆14Updated 9 years ago
Alternatives and similar repositories for provable-data-possession
Users that are interested in provable-data-possession are comparing it to the libraries listed below
Sorting:
- Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"☆21Updated last year
- Secure Aggregation for FL☆35Updated last year
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated 2 years ago
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Updated 4 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆52Updated last year
- ☆19Updated 4 years ago
- ☆13Updated 3 years ago
- MPC Secure Multiparty Computation. A three-party secret-sharing-based vertical federated learning setting. The data are vertically parti…☆23Updated 5 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 3 years ago
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning☆31Updated last week
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- A secure aggregation system for private federated learning☆41Updated last year
- Deep Learning with Intel SGX☆22Updated 6 years ago
- ☆20Updated 6 years ago
- Privacy-preserving federated learning is distributed machine learning where multiple collaborators train a model through protected gradi…☆30Updated 4 years ago
- SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning☆38Updated last year
- ☆30Updated last year
- ☆21Updated 2 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- 变色龙哈希☆23Updated 4 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- Implementation of Public Key Encryption with Keyword Search☆34Updated 9 years ago
- Efficient Dynamic Proof of Retrievability☆14Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆34Updated 4 years ago