adomasven / gsw13
☆9Updated 8 years ago
Alternatives and similar repositories for gsw13:
Users that are interested in gsw13 are comparing it to the libraries listed below
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- C++ OT extension implementation☆126Updated 4 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆80Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Efficient Private Set Intersection base on VOLE☆119Updated last month
- ☆28Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆166Updated 4 months ago
- ☆216Updated 2 months ago
- ☆15Updated 10 months ago
- A repository for private set intersection.☆178Updated 3 weeks ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆12Updated 6 months ago
- ☆66Updated 6 years ago
- ☆20Updated last year
- ☆27Updated 6 years ago
- Implementation of protocols in SecureNN.☆128Updated 2 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Private Set Union☆14Updated 2 years ago
- ☆103Updated 3 years ago
- NTT-based Fast Lattice library☆167Updated 2 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- ☆34Updated 4 years ago
- A Three Party MPC framework for Machine learning and Databases☆208Updated 11 months ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆76Updated 6 months ago
- ☆8Updated 3 years ago
- ☆12Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆37Updated 6 years ago
- ☆23Updated 2 years ago