MechFroG88 / PyMIFELinks
Functional encryption library for python
☆21Updated last year
Alternatives and similar repositories for PyMIFE
Users that are interested in PyMIFE are comparing it to the libraries listed below
Sorting:
- Implementation for the protocols described in https://eprint.iacr.org/2023/1700☆14Updated 10 months ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆30Updated 8 months ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- High Performance Implementation of Secure Multiparty Computation protocols☆24Updated this week
- FLUTE: Fast and Secure Lookup Table Evaluations☆27Updated last year
- A tiny, educational library for secure multi-party computation (in pure Python).☆92Updated 2 years ago
- Implementation of Multi-Key Homomorphic Encryption [KKLSS22]☆17Updated 2 years ago
- ☆235Updated 9 months ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆218Updated 10 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated 2 weeks ago
- Multi-party Private Set Union☆18Updated 9 months ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆89Updated 2 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆99Updated last year
- ☆10Updated 2 years ago
- ☆37Updated 2 years ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆19Updated 5 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆258Updated last month
- ☆15Updated 2 years ago
- ☆37Updated last year
- Python implementation of some existing functional encryption schemes for the inner product functionality☆16Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆80Updated 3 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆12Updated 10 months ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆78Updated last year
- Efficient Private Set Intersection base on VOLE☆134Updated 2 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Implementation of protocols in Falcon☆95Updated last year
- Code repository for the paper at USENIX Security'24☆33Updated last year
- Paper Notes in MPC with Applications to PPML☆70Updated last year
- ☆125Updated 2 months ago