encryptogroup / MOTION-FD
Function-Dependent Preprocessing in MOTION
☆10Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for MOTION-FD
- A two-party generator for Vector-OLE correlations.☆28Updated 3 years ago
- ☆17Updated last month
- High Performance Implementation of Secure Multiparty Computation protocols☆11Updated this week
- FLUTE: Fast and Secure Lookup Table Evaluations☆21Updated 6 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆30Updated last year
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆17Updated last year
- Private Decision Tree Evaluation protocols☆10Updated 4 years ago
- ☆65Updated 6 years ago
- ☆19Updated last year
- Efficient Private Set Intersection base on VOLE☆111Updated 2 months ago
- ☆27Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆38Updated 5 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆28Updated 2 years ago
- ☆19Updated 7 months ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆85Updated last year
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 3 months ago
- Implementation of protocols in Falcon☆89Updated 3 months ago
- ☆35Updated this week
- ☆22Updated 2 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆84Updated 2 years ago
- ☆104Updated 2 years ago
- Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority S…☆14Updated last month
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- Paper Notes in MPC with Applications to PPML