MonashCybersecurityLab / JanusPPLinks
A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption
☆41Updated 6 years ago
Alternatives and similar repositories for JanusPP
Users that are interested in JanusPP are comparing it to the libraries listed below
Sorting:
- Boolean Query SSE schemes☆16Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Updated 4 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Updated 3 years ago
- ☆20Updated 6 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- ☆27Updated 6 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Updated 8 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15Updated 4 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆53Updated 5 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated 10 months ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- ☆30Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- 对称可搜索加密,Cash的实现方案☆18Updated 7 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- ☆25Updated 6 years ago
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 3 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- MPC team of Security Group in HITSZ☆20Updated last month
- 一个使用CPABE的文件加密传输分享CS系统☆12Updated 6 years ago