encryptogroup / LEAKERLinks
☆17Updated 6 months ago
Alternatives and similar repositories for LEAKER
Users that are interested in LEAKER are comparing it to the libraries listed below
Sorting:
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆99Updated 2 years ago
- Library for performing Function Secret Sharing (FSS)☆93Updated 6 years ago
- DPF and PIR based on DPF in C++☆20Updated 4 years ago
- Function secret sharing (FSS) primitives including distributed point functions (DPF) and distributed comparison functions (DCF)☆28Updated 4 months ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆484Updated 3 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- A repository for private set intersection.☆184Updated 9 months ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated last month
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆43Updated 7 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 2 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆80Updated this week
- ☆37Updated 10 months ago
- ☆30Updated 2 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆87Updated 3 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆16Updated 4 years ago
- ☆124Updated 3 weeks ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆28Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆38Updated 5 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Implementations of Private Set Intersection Protocols☆186Updated 3 months ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆176Updated last month
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆14Updated 4 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 9 months ago
- ☆31Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆133Updated 3 weeks ago
- A Three Party MPC framework for Machine learning and Databases☆214Updated 6 months ago
- LaTeX package for typesetting pseudocode and cryptographic games☆183Updated last year