bernymac / CloudCryptoSearchLinks
CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted text documents in a remote server or cloud.
☆12Updated last year
Alternatives and similar repositories for CloudCryptoSearch
Users that are interested in CloudCryptoSearch are comparing it to the libraries listed below
Sorting:
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated last year
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Updated 2 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- ☆20Updated 6 years ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Updated 5 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Practical Verifiable Multi-user Forward Secure Searchable Encryption☆10Updated 3 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Updated 9 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆60Updated 8 years ago
- ☆27Updated 6 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Updated 3 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆53Updated 5 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Updated 4 years ago
- This is a simple implementation in Python of the Order Revealing scheme of Chenette et al. For more details refer to the original work:☆7Updated 4 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Updated 4 years ago
- Multi-Authority Policy-based Chameleon Hash☆14Updated 4 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- 一种基于全同态加密技术的医疗隐私保密系统,是一个较为成熟的项目,公开源代码实现,小组成员如下:王子旭、许嘉晨、夏 萌、王宏任☆62Updated 6 years ago
- implementation of seren☆13Updated 7 months ago
- Cryptographic toolkit for searchable encryption.☆27Updated 4 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆280Updated 6 months ago
- ☆17Updated 4 months ago
- Efficient Multi-User Searchable Encrypted Database☆11Updated 7 months ago
- This repository contains my implementation of the IKK attack as proposed by Islam et al. in their paper 'Access Pattern disclosure on Sea…☆11Updated 2 years ago
- A searchable encryption library from the Encrypted Systems Lab @ Brown University.☆197Updated 3 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆54Updated last month