Visa-Research / coproto
C++ coroutine protocol library.
☆11Updated last month
Alternatives and similar repositories for coproto:
Users that are interested in coproto are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- ☆20Updated 2 years ago
- Multi-party Private Set Union☆16Updated last month
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- ☆15Updated last year
- The repo of Private Set Intersection(PSI) and Private Information Retrieval(PIR) from SecretFlow.☆31Updated this week
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- ☆24Updated 2 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- Efficient Private Set Intersection base on VOLE☆125Updated 2 weeks ago
- ☆34Updated 4 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆12Updated 9 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆20Updated last year
- ☆25Updated 4 years ago
- ☆104Updated 3 years ago
- Private Set Union☆14Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Benchmarks for various multi-party computation frameworks☆19Updated 4 months ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Constant-weight PIR using Constant-weight Equality Operators☆22Updated 2 years ago
- ☆67Updated 6 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated 2 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 3 months ago
- ☆12Updated 4 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- ☆27Updated 6 years ago
- Private Set Union from Symmetric-Key Techniques☆11Updated last year