encryptogroup / PDTE
Private Decision Tree Evaluation protocols
☆11Updated 4 years ago
Alternatives and similar repositories for PDTE:
Users that are interested in PDTE are comparing it to the libraries listed below
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 3 months ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆10Updated 2 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated 2 years ago
- ☆67Updated 6 years ago
- ☆29Updated 2 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 7 months ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆13Updated last year
- ☆36Updated 4 months ago
- Function-Dependent Preprocessing in MOTION☆13Updated last year
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆12Updated 8 months ago
- MPC team of Security Group in HITSZ☆20Updated last week
- Paper Notes in MPC with Applications to PPML☆66Updated 11 months ago
- ☆31Updated last month
- ☆104Updated 3 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆20Updated last year
- Implementation of protocols in Falcon☆93Updated 7 months ago
- tree-mendously speedy DPFs in C++☆12Updated 2 months ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Benchmarks for various multi-party computation frameworks☆19Updated 4 months ago
- ☆28Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆80Updated 3 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆27Updated this week