edufourfr / reading-in-the-darkLinks
Implementation of "Reading in the Dark: Classifying Encrypted Digits with Functional Encryption"
☆21Updated last year
Alternatives and similar repositories for reading-in-the-dark
Users that are interested in reading-in-the-dark are comparing it to the libraries listed below
Sorting:
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated 10 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 3 years ago
- Secure Aggregation for FL☆35Updated last year
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- Implementation of protocols in Falcon☆93Updated 10 months ago
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- MCSI☆13Updated 3 years ago
- ☆67Updated 6 years ago
- ☆37Updated 7 months ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Code repository for the paper at USENIX Security'24☆29Updated 10 months ago
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated 2 years ago
- A secure aggregation system for private federated learning☆41Updated last year
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆10Updated 2 years ago
- ☆11Updated 5 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 6 months ago
- Symmetric Homomorphic Encryption☆10Updated 2 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆52Updated last year
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- ☆105Updated 3 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Multi‐key homomorphic encryption based on MKCKKS☆20Updated 3 years ago
- MPC Secure Multiparty Computation. A three-party secret-sharing-based vertical federated learning setting. The data are vertically parti…☆23Updated 5 years ago
- ☆30Updated 2 years ago