cygnusv / matchmaking-encryption
PoC of Identity-Based Matchmaking Encryption (CRYPTO 2019)
☆15Updated 5 years ago
Alternatives and similar repositories for matchmaking-encryption:
Users that are interested in matchmaking-encryption are comparing it to the libraries listed below
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- Functional encryption library in C☆81Updated 3 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- The reference implementation of SimplePIR and DoublePIR, accompanying the paper "One Server for the Price of Two: Simple and Fast Single-…☆82Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆12Updated 7 months ago
- Multi-party Private Set Union☆16Updated last year
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆35Updated 8 years ago
- DPF and PIR based on DPF in C++☆16Updated 3 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 2 years ago
- ☆20Updated 2 years ago
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆16Updated last year
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆24Updated last year
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆84Updated 11 months ago
- Implemention of Hierarchical Identity-Based Encryption☆23Updated 3 years ago
- TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Distributed Keygen☆26Updated last month
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- ☆39Updated 2 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆14Updated 4 years ago
- ☆14Updated this week
- Repository and website for the Estimate all the {LWE, NTRU} schemes! code and paper.☆24Updated 6 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆182Updated last year
- multi-authority attribute based encryption☆39Updated 4 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Updated 6 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Updated 8 years ago
- Implementation of Public Key Encryption with Keyword Search☆33Updated 8 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆50Updated 11 months ago
- ☆17Updated 6 months ago