Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python
☆24Mar 14, 2022Updated 4 years ago
Alternatives and similar repositories for Searchable_Symmetric_Encryption
Users that are interested in Searchable_Symmetric_Encryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆78Apr 3, 2024Updated 2 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆43Aug 16, 2018Updated 7 years ago
- ☆19Dec 2, 2018Updated 7 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Apr 13, 2021Updated 5 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Jul 7, 2024Updated last year
- Searchable Symmetric Encryption☆15Dec 2, 2022Updated 3 years ago
- CP-ABE测试加解密操作和密钥生成操作的性能☆11Jun 24, 2020Updated 5 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- The Description of the project you can watch my blog☆37Apr 18, 2021Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Jun 16, 2021Updated 4 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cryptographic toolkit for searchable encryption.☆29Jan 25, 2021Updated 5 years ago
- ☆18Mar 15, 2025Updated last year
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Nov 11, 2020Updated 5 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Jul 6, 2021Updated 4 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- ☆10May 31, 2023Updated 2 years ago
- Symmetric Homomorphic Encryption☆11Jul 26, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆32Jun 14, 2023Updated 2 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- Testing AVX capabilities with GCC☆11Jan 24, 2016Updated 10 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆38Jan 12, 2019Updated 7 years ago
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12May 7, 2022Updated 3 years ago
- Vectorized Batch PIR implementation☆12Jun 22, 2023Updated 2 years ago
- Paper Notes in MPC with Applications to PPML☆71Mar 22, 2024Updated 2 years ago
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆12May 22, 2022Updated 3 years ago
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Threshold Cryptography Golang Library☆19Jul 25, 2022Updated 3 years ago
- Stronger and Faster Side-Channel Protections for CSIDH☆21Dec 20, 2020Updated 5 years ago
- 🍒 A massif (Valgrind) extension to analyze partial memory consumptions☆22Dec 6, 2016Updated 9 years ago
- JPBC_Optimize_IBE by JPBC☆22Apr 9, 2019Updated 7 years ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆78Jan 26, 2019Updated 7 years ago
- A library for binaries feature extraction☆12Nov 22, 2024Updated last year
- Implemention of Hierarchical Identity-Based Encryption☆24Dec 16, 2021Updated 4 years ago