atulmahind / PEKSLinks
Implementation of Public Key Encryption with Keyword Search
☆35Updated 9 years ago
Alternatives and similar repositories for PEKS
Users that are interested in PEKS are comparing it to the libraries listed below
Sorting:
- Comprehensive Open Source Library for Secure Multiparty Computation☆186Updated 2 years ago
- multi-authority attribute based encryption☆44Updated 4 years ago
- Library for performing Function Secret Sharing (FSS)☆93Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- Attribute-based Encryption☆206Updated 5 years ago
- Pairing-based cryptography for Go☆101Updated 6 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆283Updated 9 months ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- The OpenABE library - open source cryptographic library with attribute-based encryption implementations in C/C++☆271Updated 2 years ago
- Functional encryption library in Go☆187Updated 2 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆99Updated 2 years ago
- C++ OT extension implementation☆128Updated 4 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆40Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆79Updated 3 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆87Updated 3 years ago
- Implementations of Private Set Intersection Protocols☆186Updated 3 months ago
- A FRamework for Efficient Secure COmputation☆140Updated 7 months ago
- Decentralized CP-ABE☆119Updated 8 months ago
- ☆232Updated 8 months ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- ☆182Updated 4 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆176Updated last month
- ☆21Updated 2 years ago
- The Pairing-based Crypto library☆259Updated 2 months ago
- ☆62Updated 4 years ago
- Example implementation of the SealPIR protocol☆153Updated 10 months ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆189Updated 4 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆217Updated 9 months ago