Private Decision Tree Evaluation protocols
☆11Jun 9, 2020Updated 5 years ago
Alternatives and similar repositories for PDTE
Users that are interested in PDTE are comparing it to the libraries listed below
Sorting:
- Fast Homomorphic Evaluation of Deep Discretized Neural Networks☆45Nov 21, 2017Updated 8 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆11Jan 27, 2023Updated 3 years ago
- A two-party generator for Vector-OLE correlations.☆31Jan 17, 2021Updated 5 years ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆18Nov 13, 2023Updated 2 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Oct 1, 2019Updated 6 years ago
- Privacy -preserving Neural Networks☆79Dec 21, 2018Updated 7 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference" (USENIX Security 2023)☆21Jun 27, 2023Updated 2 years ago
- A Parallel Secure Machine Learning Framework on GPUs☆21Nov 17, 2021Updated 4 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Jul 16, 2020Updated 5 years ago
- Privacy preserving vertical federated learning for tree-based models☆30Nov 11, 2021Updated 4 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆113Jul 20, 2023Updated 2 years ago
- ☆67Sep 16, 2018Updated 7 years ago
- C++ OT extension implementation☆128Nov 13, 2020Updated 5 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Feb 26, 2023Updated 3 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆128Nov 14, 2023Updated 2 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆35Jun 10, 2021Updated 4 years ago
- ☆39Nov 8, 2024Updated last year
- Implementation of a simple linear regression algorithm in MAMBA☆10Feb 12, 2020Updated 6 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Oct 29, 2022Updated 3 years ago
- Library for performing Function Secret Sharing (FSS)☆94Nov 15, 2018Updated 7 years ago
- Secure Inference Resilient Against Malicious Clients☆15May 3, 2022Updated 3 years ago
- Nada-Numpy is a Python library designed for algebraic operations on NumPy-like array objects on top of Nada DSL and Nillion Network.☆12Nov 21, 2024Updated last year
- ☆53Jun 10, 2025Updated 8 months ago
- Privacy-Preserving Multiple Tensor Factorization for Synthesizing Large-Scale Location Traces☆14Sep 14, 2021Updated 4 years ago
- Python Library for Function Approximation in Machine Learning☆12Nov 5, 2019Updated 6 years ago
- Common MPC Pitfalls☆12Feb 14, 2026Updated 2 weeks ago
- Minimal pure-Python library that implements a basic version of a secure decentralized biometric authentication functionality via a secure…☆13Mar 27, 2024Updated last year
- ☆11May 17, 2021Updated 4 years ago
- Implementation of protocols in Falcon☆95Jul 30, 2024Updated last year
- TensorFlow World 2019 Tutorial: Privacy-Preserving Machine Learning with TF Encrypted & PySyft☆45May 16, 2023Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆182Nov 13, 2025Updated 3 months ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆20Feb 24, 2026Updated last week
- This course introduced me to three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Enc…☆11Sep 2, 2019Updated 6 years ago
- CUDA-accelerated Dilithium Implementation☆13Sep 8, 2024Updated last year
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- tree-mendously speedy DPFs in C++☆12Dec 19, 2024Updated last year
- The repo of "Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits" (CCS 2024)☆12Sep 6, 2024Updated last year
- A benchmark of globally-optimal anonymization methods for biomedical data☆16Dec 11, 2014Updated 11 years ago