Ye-D / Meteor
Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs
☆10Updated 2 years ago
Alternatives and similar repositories for Meteor:
Users that are interested in Meteor are comparing it to the libraries listed below
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated last year
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆20Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆40Updated 5 years ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- ☆15Updated 4 months ago
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆15Updated this week
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated last year
- ☆36Updated 3 months ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 3 years ago
- Function-Dependent Preprocessing in MOTION☆11Updated last year
- ☆27Updated 2 weeks ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- ☆67Updated 6 years ago
- MPC team of Security Group in HITSZ☆20Updated 5 months ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆13Updated last year
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 6 months ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆26Updated last month
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- ☆14Updated last year
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆20Updated 2 years ago
- tree-mendously speedy DPFs in C++☆12Updated 2 months ago
- MCSI☆13Updated 3 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- Experimental Code for Private Decision Tree Evaluation☆12Updated last year
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 2 months ago
- Secure Aggregation for Federated Learning with Malicious Actors☆24Updated 2 years ago
- ☆19Updated 3 years ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆52Updated 3 years ago
- ☆29Updated 2 years ago