Private Information Retrieval protocol
☆45Apr 3, 2021Updated 4 years ago
Alternatives and similar repositories for PIR
Users that are interested in PIR are comparing it to the libraries listed below
Sorting:
- Example implementation of the SealPIR protocol☆156Nov 19, 2024Updated last year
- An efficient computational private information retrieval (CPIR) library☆21Apr 15, 2023Updated 2 years ago
- Private Set Intersection Cardinality protocol based on ECDH and Bloom Filters☆150Feb 17, 2026Updated last week
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 3 years ago
- A repo to hold common tools used by my crypto projects☆133Sep 30, 2025Updated 5 months ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆57Jul 24, 2023Updated 2 years ago
- APSI is a C++ library for Asymmetric (unlabeled or labeled) Private Set Intersection.☆209Dec 30, 2023Updated 2 years ago
- Introduction to Secure Multi-Party Computations☆16Nov 13, 2018Updated 7 years ago
- XPIR: Private Information Retrieval for Everyone☆118Oct 18, 2021Updated 4 years ago
- elliptic curve construction tool☆17Feb 24, 2023Updated 3 years ago
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- A Microsoft-SEAL-compatible implementation of homomorphic encryption targeting Azure Sphere and other embedded devices.☆54Jan 24, 2022Updated 4 years ago
- Sample code and build environments for MPC frameworks☆521Dec 12, 2024Updated last year
- A SMPC companion library for Syft☆106Feb 4, 2026Updated 3 weeks ago
- A repository for private set intersection.☆186Dec 23, 2024Updated last year
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Jul 20, 2023Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆37May 2, 2022Updated 3 years ago
- ☆21Jun 17, 2022Updated 3 years ago
- ☆127Feb 17, 2026Updated last week
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Oct 29, 2022Updated 3 years ago
- Constant-weight PIR using Constant-weight Equality Operators☆23May 5, 2022Updated 3 years ago
- ☆25Apr 1, 2025Updated 11 months ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- ☆15Sep 1, 2025Updated 6 months ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Implements the Barreto-Naehrig (BN) curve as used by Ethereum☆12May 31, 2019Updated 6 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆486Jan 26, 2026Updated last month
- Python Data Loss Prevention (DLP) SDK - Nightfall Developer Platform☆25Nov 28, 2023Updated 2 years ago