cecyliaborek / FE-inner-productLinks
Python implementation of some existing functional encryption schemes for the inner product functionality
☆16Updated 3 years ago
Alternatives and similar repositories for FE-inner-product
Users that are interested in FE-inner-product are comparing it to the libraries listed below
Sorting:
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Code repository for the paper at USENIX Security'24☆37Updated last year
- A secure aggregation system for private federated learning☆47Updated last year
- Secure Aggregation for FL☆37Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆263Updated 4 months ago
- Repository for collection of research papers on multi-party learning.☆34Updated 2 years ago
- ☆38Updated last year
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆90Updated this week
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Implementation of protocols in Falcon☆95Updated last year
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆53Updated 11 months ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆57Updated last week
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated last year
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 4 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Updated 3 years ago
- ☆110Updated 4 years ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- ☆16Updated 2 years ago
- MPC team of Security Group in HITSZ☆19Updated 2 weeks ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- ☆10Updated 2 years ago
- Implementation of Distributed function secret sharing and applications☆15Updated 8 months ago
- ☆20Updated 7 years ago
- ☆67Updated 7 years ago
- An implementation of Secure Aggregation algorithm based on "Practical Secure Aggregation for Privacy-Preserving Machine Learning (Bonawit…☆91Updated 6 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆88Updated 4 years ago
- ☆39Updated 2 years ago
- Single & Multi Key Homomorphic Encryption Library☆19Updated 3 years ago
- Private Inference on Transformer☆30Updated 2 years ago
- ☆129Updated 4 months ago