delta-mpc / delta-zk
The zero knowledge proof system used in Delta.
☆13Updated last year
Alternatives and similar repositories for delta-zk:
Users that are interested in delta-zk are comparing it to the libraries listed below
- Efficient and Interactive Zero-Knowledge Proofs☆86Updated last year
- ☆68Updated last month
- ☆59Updated 3 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆22Updated 10 months ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆33Updated 3 years ago
- A tiny, educational library for secure multi-party computation (in pure Python).☆89Updated last year
- ☆22Updated last month
- An implementation of the Rinocchio protocol (SNARK for Ring Arithmetic) over SEAL FHE ring elements☆37Updated last year
- ☆17Updated 6 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆40Updated 5 years ago
- Awesome list for cryptographic secure computation paper. This repo includes *Lattice*, *DifferentialPrivacy*, *MPC* and also a comprehens…☆208Updated last month
- ☆10Updated last year
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆20Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- Libra zero knowledge proof system☆48Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆80Updated 3 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆28Updated 6 years ago
- This project implements twisted ElGamal PKE, which is additively homomorphic and zero-knowledge proof friendly.☆7Updated 2 years ago
- Multi-party Private Set Union☆16Updated 3 weeks ago
- A GKR-based zero-knowledge proof protocol for CNN model inference.☆74Updated last year
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆16Updated last year
- ☆13Updated 3 years ago
- Python3 implementation of Bulletproofs - non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup…☆26Updated 2 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆16Updated last week
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- ☆103Updated 3 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- ☆12Updated last year
- ☆33Updated last year