MonashCybersecurityLab / SHVE
Symmetric-key Hidden Vector Encryption Scheme
☆18Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for SHVE
- Boolean Query SSE schemes☆14Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆34Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆93Updated 3 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆10Updated 4 months ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- ☆22Updated 5 years ago
- ☆22Updated 5 years ago
- Maintain a list of open source libraries of cryptographic excellence☆56Updated last year
- Traceable and Revocable Attribute-based Encryption in Java☆46Updated 5 years ago
- Paper Notes in MPC with Applications to PPML☆65Updated 7 months ago
- ☆20Updated 5 years ago
- ☆27Updated last year
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆84Updated 2 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆12Updated 2 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Updated 3 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆93Updated last year
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆23Updated 2 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆13Updated 3 years ago
- A Three Party MPC framework for Machine learning and Databases☆201Updated 9 months ago
- A two-party generator for Vector-OLE correlations.☆28Updated 3 years ago
- The Description of the project you can watch my blog☆32Updated 3 years ago
- FAME CP-ABE Encryption based on JPBC☆27Updated 4 years ago
- ☆15Updated 8 months ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆17Updated 4 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆77Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆111Updated 2 months ago
- ☆110Updated 7 months ago
- Materials about Privacy-Preserving Machine Learning☆232Updated 4 months ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆14Updated 3 years ago