cryptograph / stealthdb
StealthDB: an encrypted database from intel sgx with small trusted computing base.
☆60Updated 3 years ago
Alternatives and similar repositories for stealthdb:
Users that are interested in stealthdb are comparing it to the libraries listed below
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- Monomi designer and planner prototype☆14Updated 10 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- CMake file for using Intel SGX on Linux☆50Updated 3 years ago
- Fast interface for SGX secure enclaves. Based on ISCA 2017 HotCalls paper☆24Updated 3 years ago
- ☆25Updated 6 years ago
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆37Updated 2 years ago
- EdgelessDB is a MySQL-compatible database for confidential computing. It runs entirely inside a secure enclave and comes with advanced fe…☆170Updated last year
- An encrypted data analytics platform☆180Updated last year
- ☆55Updated last year
- Example of Linux SGX remote attestation☆63Updated 6 years ago
- ExitLess services for SGX enclaves☆33Updated 5 years ago
- ☆113Updated 2 years ago
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- A relational Multi-Party Computation framework for analytics in untrusted clouds☆27Updated 6 months ago
- An Implementation of Order-Revealing Encryption☆92Updated 4 years ago
- ☆35Updated 4 years ago
- A curated list of SGX code and resources.☆240Updated 8 months ago
- Canonical repository https://git.dbogatov.org/bu/ore-benchmark/Project-Code☆20Updated 2 years ago
- ☆46Updated 11 months ago
- With a goal to make confidential computing easier, SOFAEnclave is a software stack consisting of key technologies such as HW/SW enclave i…☆18Updated last year
- mbedtls-SGX: a SGX-friendly TLS stack (ported from mbedtls)☆90Updated 5 years ago
- ☆28Updated last year
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 8 months ago
- Implementations of Private Set Intersection Protocols☆178Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆96Updated 3 years ago
- Global-Scale Secure Multiparty Computation☆43Updated 2 years ago
- TEE Relational Operator Benchmark Suite☆13Updated 6 months ago