CongGroup / ASIACCS-17Links
EncKV: An Encrypted Key-value Store with Rich Queries
☆11Updated 8 years ago
Alternatives and similar repositories for ASIACCS-17
Users that are interested in ASIACCS-17 are comparing it to the libraries listed below
Sorting:
- Library for performing Function Secret Sharing (FSS)☆93Updated 7 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 3 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- Implementation of SoftSpokenOT. Forked from libOTe.☆10Updated last year
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆80Updated last week
- Comprehensive Open Source Library for Secure Multiparty Computation☆188Updated 2 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆64Updated 7 years ago
- ☆184Updated 4 years ago
- DPF and PIR based on DPF in C++☆20Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 4 years ago
- C++ OT extension implementation☆128Updated 5 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆35Updated 3 years ago
- Functional encryption library in C☆89Updated 4 years ago
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Private Information Retrieval protocol☆46Updated 4 years ago
- ☆23Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- ☆37Updated 5 years ago
- A FRamework for Efficient Secure COmputation☆139Updated 8 months ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆127Updated 2 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆27Updated 2 years ago
- Example implementation of the SealPIR protocol☆155Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆101Updated 2 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Updated last year
- HAL: A Library for Homomorphic Authentication☆21Updated 8 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆179Updated last week