JezaChen / Searchable_Symmetric_EncryptionLinks
Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python
☆25Updated 3 years ago
Alternatives and similar repositories for Searchable_Symmetric_Encryption
Users that are interested in Searchable_Symmetric_Encryption are comparing it to the libraries listed below
Sorting:
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- ☆20Updated 6 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆53Updated 5 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated 10 months ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆60Updated 8 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- ☆27Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆97Updated 3 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆72Updated last year
- The Description of the project you can watch my blog☆35Updated 4 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15Updated 4 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆13Updated 11 months ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆22Updated 2 years ago
- Private Set Union☆15Updated 2 years ago
- ☆16Updated last year
- ☆30Updated 2 years ago
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Updated 4 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆44Updated 5 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago