CASP-Systems-BU / SecrecyLinks
A relational Multi-Party Computation framework for analytics in untrusted clouds
☆30Updated 10 months ago
Alternatives and similar repositories for Secrecy
Users that are interested in Secrecy are comparing it to the libraries listed below
Sorting:
- ☆20Updated last year
- ☆30Updated last year
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- ☆56Updated last year
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆57Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- Piranha: A GPU Platform for Secure Computation☆95Updated 2 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆112Updated last year
- Symmetric Partial Homomorphic Encryption☆11Updated 4 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- A high-throughput oblivious storage system☆26Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆84Updated 4 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 6 months ago
- TEE Relational Operator Benchmark Suite☆13Updated 10 months ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- The repo of Private Set Intersection(PSI) and Private Information Retrieval(PIR) from SecretFlow.☆35Updated last week
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Open source implementation of TaoStore☆8Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆26Updated last year
- Private Information Retrieval protocol☆45Updated 4 years ago
- A Three Party MPC framework for Machine learning and Databases☆211Updated 3 months ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆29Updated 6 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- ☆105Updated 3 years ago
- ☆13Updated 9 months ago
- Secure auditing of Internet services with Intel SGX☆22Updated 4 years ago
- ☆119Updated last year