encryptogroup / PDTE
Private Decision Tree Evaluation protocols
☆11Updated 4 years ago
Alternatives and similar repositories for PDTE:
Users that are interested in PDTE are comparing it to the libraries listed below
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Our first MPC program (aka: MP-SPDZ by a dummy)☆13Updated last year
- ☆67Updated 6 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated last year
- Improved Secure 3-Party Neural Network Inference with Reducing Online Communication Costs☆10Updated 2 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 2 months ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- ☆103Updated 3 years ago
- ☆29Updated 2 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Updated 5 years ago
- tree-mendously speedy DPFs in C++☆12Updated last month
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆20Updated last year
- ☆36Updated 3 months ago
- ☆27Updated 6 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated last year
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆12Updated 7 months ago
- ☆34Updated 4 years ago
- ☆26Updated last week
- Paper Notes in MPC with Applications to PPML☆64Updated 10 months ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 6 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Implementation of protocols in Falcon☆93Updated 6 months ago
- Homomorphic matrix computation☆41Updated 5 years ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 3 years ago
- ☆23Updated 2 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆22Updated 10 months ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year