JezaChen / Searchable_Symmetric_EncryptionLinks
Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python
☆25Updated 3 years ago
Alternatives and similar repositories for Searchable_Symmetric_Encryption
Users that are interested in Searchable_Symmetric_Encryption are comparing it to the libraries listed below
Sorting:
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Updated 7 years ago
- Boolean Query SSE schemes☆16Updated 7 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆13Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- ☆20Updated 6 years ago
- Private Set Union☆15Updated 2 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆56Updated 5 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆30Updated 6 years ago
- C++ OT extension implementation☆128Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆99Updated 2 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15Updated 4 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆36Updated this week
- ☆12Updated 4 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Implementation of protocols in Falcon☆95Updated last year
- A Three Party MPC framework for Machine learning and Databases☆212Updated 6 months ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆60Updated 8 years ago
- Attribute-based Encryption☆206Updated 5 years ago
- ☆240Updated 4 months ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆176Updated last month
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆283Updated 9 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated 2 months ago