emp-toolkit / emp-pvc
☆9Updated 4 years ago
Related projects: ⓘ
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆22Updated last year
- MPC Simulation Framework☆24Updated last year
- ☆11Updated last year
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆34Updated 3 years ago
- ☆10Updated 4 years ago
- Benchmarks for various multi-party computation frameworks☆17Updated 3 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆33Updated 4 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆34Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆75Updated 2 years ago
- ☆17Updated last year
- Homomorphic comparison in leveled homomorphic encryption and its applications☆34Updated 3 years ago
- A two-party generator for Vector-OLE correlations.☆27Updated 3 years ago
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Updated 7 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆23Updated 8 years ago
- ☆20Updated last year
- Library for performing Function Secret Sharing (FSS)☆82Updated 5 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆77Updated 7 months ago
- Constant-weight PIR using Constant-weight Equality Operators☆20Updated 2 years ago
- ☆22Updated 2 years ago
- Implementation of the Paillier homomorphic cryptosystem using GMP☆30Updated 2 years ago
- Global-Scale Secure Multiparty Computation☆40Updated last year
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆20Updated 5 months ago
- Private Information Retrieval protocol☆41Updated 3 years ago
- Collection of MPC Protocols, mostly using libscapi☆12Updated 4 years ago
- ☆34Updated 3 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆32Updated 7 months ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆17Updated last year