encryptogroup / LEAKERLinks
☆17Updated 3 months ago
Alternatives and similar repositories for LEAKER
Users that are interested in LEAKER are comparing it to the libraries listed below
Sorting:
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- DPF and PIR based on DPF in C++☆20Updated 4 years ago
- ☆30Updated last year
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Library for performing Function Secret Sharing (FSS)☆90Updated 6 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Updated 5 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated last year
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Updated 4 years ago
- Function secret sharing (FSS) primitives including distributed point functions (DPF) and distributed comparison functions (DCF)☆27Updated last month
- Constant-weight PIR using Constant-weight Equality Operators☆23Updated 3 years ago
- ☆30Updated 2 years ago
- Multi-party Private Set Union☆18Updated 4 months ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆98Updated 4 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Updated 2 years ago
- ☆105Updated 3 years ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Updated 4 years ago
- ☆13Updated 9 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- ☆37Updated 7 months ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Updated 3 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated 11 months ago
- The repo of Private Set Intersection(PSI) and Private Information Retrieval(PIR) from SecretFlow.☆35Updated last week
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆87Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago