MonashCybersecurityLab / AuraLinks
Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy
☆15Updated 4 years ago
Alternatives and similar repositories for Aura
Users that are interested in Aura are comparing it to the libraries listed below
Sorting:
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Updated 7 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆101Updated 4 years ago
- Boolean Query SSE schemes☆16Updated 7 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Updated 3 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated last year
- pairing based cryptography☆15Updated 7 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆80Updated last week
- ☆31Updated 2 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- 一个使用CPABE的文件加密传输分享CS系统☆12Updated 6 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆13Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- ☆20Updated 6 years ago
- Multi-party Private Set Union☆18Updated 7 months ago
- Attribute-based Encryption☆207Updated 5 years ago
- ☆229Updated 7 months ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆33Updated 2 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆15Updated 3 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- ☆13Updated 2 weeks ago
- ☆12Updated 4 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆132Updated 2 weeks ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- A repository for private set intersection.☆184Updated 8 months ago