ShallMate / -Homomorphic-SM2-9Links
☆19Updated last year
Alternatives and similar repositories for -Homomorphic-SM2-9
Users that are interested in -Homomorphic-SM2-9 are comparing it to the libraries listed below
Sorting:
- Implementation of protocols in Falcon☆95Updated last year
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆102Updated 2 years ago
- ☆240Updated 2 months ago
- Function Secret Sharing (FSS) primitives including Distributed Point Function (DPF) and Distributed Comparison Function (DCF)☆30Updated last week
- ☆32Updated 2 years ago
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- Code repository for the paper at USENIX Security'24☆37Updated last year
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆92Updated 2 weeks ago
- Function-Dependent Preprocessing in MOTION☆14Updated 2 years ago
- ☆67Updated 7 years ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- LHSS is an implementation of lattice-based homomorphic secret sharing.☆12Updated 5 years ago
- Improved Constructions for Distributed Multi-Point Functions - accepted to IEEE S&P 2025☆17Updated 4 months ago
- A Three Party MPC framework for Machine learning and Databases☆211Updated 10 months ago
- MPC team of Security Group in HITSZ☆19Updated 3 weeks ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 4 years ago
- ☆38Updated last year
- A two-party generator for Vector-OLE correlations.☆30Updated 5 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated last year
- Implementation of Distributed function secret sharing and applications☆15Updated 9 months ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 months ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆183Updated 2 months ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆91Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆263Updated last week
- ☆32Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Updated 2 months ago
- ☆52Updated 3 years ago