caohuikang / RingORAMLinks
☆10Updated 7 years ago
Alternatives and similar repositories for RingORAM
Users that are interested in RingORAM are comparing it to the libraries listed below
Sorting:
- ☆32Updated 2 years ago
- Open-source library for ORAM implementations☆11Updated 5 years ago
- A high-throughput oblivious storage system☆28Updated 2 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Updated 5 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 3 years ago
- A unified testbed for evaluating different Oblivious RAM☆61Updated 2 years ago
- ☆37Updated 5 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 3 years ago
- Path ORAM reference implementation☆35Updated 5 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Updated 2 years ago
- ☆129Updated 4 months ago
- A repo to hold common tools used by my crypto projects☆132Updated 3 months ago
- 2021-USTC-信息安全作品赛数据安全CP-ABE云数据系统项目, 基于CP-ABE方案实现安全的数据存储和访问服务的数据系统.☆18Updated 4 years ago
- CMake file for using Intel SGX on Linux☆52Updated 4 years ago
- Deep Learning with Intel SGX☆23Updated 6 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Updated this week
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆26Updated 6 years ago
- An encrypted netdisk. Base on KVM(Key Encapsulation Mechanism) with CP-ABE(Cipher Policy Attribute Encryption). Multi attributes-set allo…☆17Updated 8 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆87Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Updated last month
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆54Updated last year
- ☆20Updated 7 years ago
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 7 years ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆35Updated 3 years ago
- Implementations of Private Set Intersection Protocols☆187Updated 6 months ago
- ☆239Updated last month
- Example implementation of the SealPIR protocol☆157Updated last year