MonashCybersecurityLab / SHVE
Symmetric-key Hidden Vector Encryption Scheme
☆19Updated 6 years ago
Alternatives and similar repositories for SHVE:
Users that are interested in SHVE are comparing it to the libraries listed below
- Boolean Query SSE schemes☆14Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆38Updated 6 years ago
- ☆26Updated 6 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆10Updated 7 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆96Updated 3 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆14Updated 3 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆11Updated last year
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- 此项目实现了基于CPABE策略的 属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆11Updated 2 years ago
- Graduate Project: CP-ABE-Encrypt☆20Updated 11 years ago
- Maintain a list of open source libraries of cryptographic excellence☆59Updated last year
- ☆53Updated 2 years ago
- Multi-Authority Policy-based Chameleon Hash☆11Updated 4 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Updated 4 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆18Updated 4 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 2 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆27Updated last year
- ☆29Updated 2 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- ☆22Updated 5 years ago
- Paper Notes in MPC with Applications to PPML☆65Updated 10 months ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Updated 6 years ago
- ☆20Updated 6 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- LSSS, ABE☆15Updated 4 years ago
- ☆11Updated 4 years ago
- Decentralized CP-ABE☆112Updated last month
- 对称可搜索加密,Cash的实现方案☆19Updated 6 years ago
- Symmetric Homomorphic Encryption☆8Updated 2 years ago