Implementation of some SSE schemes, including Sophos, Diana and Janus
☆99Jun 16, 2021Updated 4 years ago
Alternatives and similar repositories for opensse-schemes
Users that are interested in opensse-schemes are comparing it to the libraries listed below
Sorting:
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆205Jun 29, 2022Updated 3 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆15May 12, 2021Updated 4 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Apr 13, 2021Updated 4 years ago
- Cryptographic toolkit for searchable encryption.☆29Jan 25, 2021Updated 5 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆76Apr 3, 2024Updated last year
- Verifiable Forward Secure SSE scheme☆10Mar 9, 2020Updated 5 years ago
- OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time☆12May 22, 2022Updated 3 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Feb 9, 2023Updated 3 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- Searchable Symmetric Encryption☆15Dec 2, 2022Updated 3 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆24Mar 14, 2022Updated 3 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 9 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆22May 2, 2022Updated 3 years ago
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- 对称可搜索加密 ,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Nov 18, 2015Updated 10 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Oct 24, 2022Updated 3 years ago
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 9 years ago
- 对称可搜索加密SWP方案的C++实现☆20May 5, 2021Updated 4 years ago
- ☆36Oct 26, 2020Updated 5 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆18Sep 3, 2021Updated 4 years ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Feb 11, 2020Updated 6 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- JHU Advanced Topics in Applied Cryptography (601.745)☆53Apr 16, 2018Updated 7 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 5 years ago
- Path ORAM reference implementation☆35Jul 25, 2020Updated 5 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆487Jan 26, 2026Updated last month
- A unified testbed for evaluating different Oblivious RAM☆61May 4, 2023Updated 2 years ago
- Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).☆10Sep 14, 2020Updated 5 years ago
- BLS working standard draft☆39Aug 8, 2019Updated 6 years ago
- ☆10Apr 22, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- ☆32Jul 12, 2023Updated 2 years ago