An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data. Based off the 2014 research of David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner
☆58Feb 19, 2017Updated 9 years ago
Alternatives and similar repositories for Searchable-Symmetric-Encryption
Users that are interested in Searchable-Symmetric-Encryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Aug 16, 2018Updated 7 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆15Jul 7, 2024Updated last year
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 6 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆78Apr 3, 2024Updated 2 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆209Jun 29, 2022Updated 3 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Jun 16, 2021Updated 4 years ago
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- Cryptographic toolkit for searchable encryption.☆28Jan 25, 2021Updated 5 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆23May 2, 2022Updated 4 years ago
- The Description of the project you can watch my blog☆37Apr 18, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- 公钥可搜索加密☆17Jan 17, 2021Updated 5 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 10 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- ☆25Jul 1, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- Testing AVX capabilities with GCC☆11Jan 24, 2016Updated 10 years ago
- Benchmarking RESTful APIs written in Python, NodeJS and Golang☆15Sep 23, 2021Updated 4 years ago
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆12May 22, 2022Updated 3 years ago
- 一种基于MAE人脸隐私保护方法的身份认证系统☆14Jul 31, 2022Updated 3 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- Decentralized CP-ABE☆119Apr 18, 2026Updated 2 weeks ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆32Mar 10, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Secure Logistic Regression based on Homomorphic Encryption☆43Aug 2, 2019Updated 6 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆21Dec 20, 2020Updated 5 years ago
- ☆16Apr 24, 2026Updated last week
- 🍒 A massif (Valgrind) extension to analyze partial memory consumptions☆22Dec 6, 2016Updated 9 years ago
- xdu自动填报&邮件推送☆10Dec 8, 2022Updated 3 years ago
- 基于hyperledger fabric区块链搭建的医疗病例共享及转诊平台☆31Oct 22, 2022Updated 3 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Feb 29, 2024Updated 2 years ago