An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data. Based off the 2014 research of David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, and Michael Steiner
☆59Feb 19, 2017Updated 9 years ago
Alternatives and similar repositories for Searchable-Symmetric-Encryption
Users that are interested in Searchable-Symmetric-Encryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 4 years ago
- ☆19Dec 2, 2018Updated 7 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Jul 7, 2024Updated last year
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆25Dec 21, 2018Updated 7 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆77Apr 3, 2024Updated last year
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆208Jun 29, 2022Updated 3 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Apr 13, 2021Updated 4 years ago
- Searchable Symmetric Encryption☆15Dec 2, 2022Updated 3 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- Cryptographic toolkit for searchable encryption.☆29Jan 25, 2021Updated 5 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆23May 2, 2022Updated 3 years ago
- The Description of the project you can watch my blog☆37Apr 18, 2021Updated 4 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- A test library for computing modular exponentiation in parallel using AVX-512 vector arithmetic☆12Dec 18, 2023Updated 2 years ago
- Course description: Physics +CS , it is the first term in a three-term course on quantum computation and quantum information science. Top…☆16May 25, 2024Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 公钥可搜索加密☆17Jan 17, 2021Updated 5 years ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Jun 6, 2021Updated 4 years ago
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 9 years ago
- Updated! (Dec2-2019) This is a C-language software library that provides optimized implementations of the Diffie-Hellman functions known …☆44Nov 10, 2023Updated 2 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- ☆25Jul 1, 2022Updated 3 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆37Jan 12, 2019Updated 7 years ago
- FLTracer: Accurate Poisoning Attack Provenance in Federated Learning☆24Jun 14, 2024Updated last year
- Benchmarking RESTful APIs written in Python, NodeJS and Golang☆15Sep 23, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆12May 22, 2022Updated 3 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Feb 13, 2019Updated 7 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- SIMD Vectorized implementation of X25519, Ed25519, X448 and Ed448☆31Mar 10, 2025Updated last year
- A halfedge mesh data structure for triangulated meshes in Python☆12Mar 30, 2021Updated 4 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Aug 2, 2019Updated 6 years ago
- 本书是《5G Mobile Networks : A Systems Approach》(https://5g.systemsapproach.org/)的中文版翻译。☆13Jun 26, 2022Updated 3 years ago