A searchable encryption library from the Encrypted Systems Lab @ Brown University.
☆208Jun 29, 2022Updated 3 years ago
Alternatives and similar repositories for Clusion
Users that are interested in Clusion are comparing it to the libraries listed below
Sorting:
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Jun 16, 2021Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆44Aug 16, 2018Updated 7 years ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Nov 18, 2015Updated 10 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Oct 31, 2023Updated 2 years ago
- Boolean Query SSE schemes☆15Aug 28, 2018Updated 7 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆59Feb 19, 2017Updated 9 years ago
- A version of OpenWhisper System's Signal App with secure message search (built with Clusion)☆21Jul 24, 2017Updated 8 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆20Oct 1, 2018Updated 7 years ago
- ☆14Jan 23, 2023Updated 3 years ago
- An Implementation of Order-Revealing Encryption☆101Aug 31, 2020Updated 5 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Nov 11, 2020Updated 5 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Apr 13, 2021Updated 4 years ago
- ☆25Dec 21, 2018Updated 7 years ago
- ☆26Jun 18, 2019Updated 6 years ago
- Symmetric searchable encryption database.☆19Apr 16, 2016Updated 9 years ago
- Cryptographic toolkit for searchable encryption.☆29Jan 25, 2021Updated 5 years ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆55Apr 9, 2020Updated 5 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- 对称可搜索加密,Cash的实现方案☆19Jun 10, 2018Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- SSEPy: Implementation of searchable symmetric encryption in pure Python☆77Apr 3, 2024Updated last year
- EncKV: An Encrypted Key-value Store with Rich Queries☆11Oct 10, 2017Updated 8 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆11Nov 11, 2020Updated 5 years ago
- Implementation of a toolkit for ring-LWE based cryptography in arbitrary cyclotomic number fields.☆38Mar 3, 2016Updated 10 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Optimized implementation of ring-TESLA☆11Aug 4, 2016Updated 9 years ago
- A cryptography library from NICS Lab☆20Jan 22, 2013Updated 13 years ago
- Quick start for IronCore's encrypted Elasticsearch proxy☆16Jul 29, 2024Updated last year
- 基于可搜索加密的云存储方案☆26May 8, 2019Updated 6 years ago
- A Flexible Efficient Secure Computation Backend☆33May 26, 2018Updated 7 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆13Sep 23, 2021Updated 4 years ago
- Fuzzy keyword search over encrypted data in cloud computing | PHP project☆26Oct 25, 2024Updated last year
- ☆10Mar 24, 2020Updated 5 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Jun 2, 2017Updated 8 years ago
- Implementation of Public Key Encryption with Keyword Search☆36Apr 3, 2016Updated 9 years ago
- Implementation of https://www.ietf.org/archive/id/draft-denis-aegis-aead-00.html / https://competitions.cr.yp.to/round3/aegisv11.pdf☆15Mar 25, 2025Updated 11 months ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆22May 2, 2022Updated 3 years ago