CASP-Systems-BU / SecrecyLinks
A relational Multi-Party Computation framework for analytics in untrusted clouds
☆30Updated 11 months ago
Alternatives and similar repositories for Secrecy
Users that are interested in Secrecy are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- ☆20Updated last year
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- ☆56Updated last year
- ☆30Updated 2 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆57Updated 5 years ago
- A high-throughput oblivious storage system☆26Updated 2 years ago
- TEE Relational Operator Benchmark Suite☆14Updated 11 months ago
- Piranha: A GPU Platform for Secure Computation☆98Updated 2 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆12Updated 4 years ago
- A Parallel Secure Machine Learning Framework on GPUs☆22Updated 3 years ago
- SecretFlow-Serving is a serving system for privacy-preserving machine learning models.☆10Updated last week
- ☆121Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆86Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- A Three Party MPC framework for Machine learning and Databases☆211Updated 4 months ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- Open source implementation of TaoStore☆8Updated 4 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆27Updated last year
- Implementations of Private Set Intersection Protocols☆184Updated last month
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 3 years ago
- A repository for private set intersection.☆184Updated 7 months ago
- ☆19Updated 5 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Updated 2 years ago
- ☆236Updated 2 months ago
- A Cryptographic Inference Service for Neural Networks☆130Updated last year
- ☆106Updated 3 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- ☆42Updated last year
- Privacy -preserving Neural Networks☆78Updated 6 years ago