MonashCybersecurityLab / SHVELinks
Symmetric-key Hidden Vector Encryption Scheme
☆19Updated 7 years ago
Alternatives and similar repositories for SHVE
Users that are interested in SHVE are comparing it to the libraries listed below
Sorting:
- Boolean Query SSE schemes☆16Updated 7 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆45Updated 7 years ago
- The Description of the project you can watch my blog☆38Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- ☆20Updated 7 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated last month
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆101Updated 2 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆284Updated 11 months ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆12Updated 5 years ago
- 对称可搜索加密,Cash的实现方案☆19Updated 7 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15Updated 4 years ago
- ☆56Updated 3 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated last year
- Python implementation of some existing functional encryption schemes for the inner product functionality☆16Updated 3 years ago
- Repository for collection of research papers on multi-party learning.☆34Updated 2 years ago
- ☆27Updated 7 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated last year
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆87Updated 3 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆32Updated 2 years ago
- ☆32Updated 3 years ago
- Materials about Privacy-Preserving Machine Learning☆262Updated 3 months ago
- Attribute-based Encryption☆207Updated 5 years ago
- ☆12Updated 5 years ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆491Updated 3 years ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆90Updated this week
- ☆129Updated 3 months ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆191Updated 4 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- ☆246Updated 6 months ago