encryptogroup / linearPFE
Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).
☆10Updated 4 years ago
Alternatives and similar repositories for linearPFE:
Users that are interested in linearPFE are comparing it to the libraries listed below
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆15Updated 4 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 8 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- ☆22Updated last week
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆119Updated last year
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- ☆39Updated 3 months ago
- ☆14Updated 2 weeks ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated last year
- ☆14Updated 3 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆37Updated 5 months ago
- proof of concepts and experimental code for TFHE☆20Updated 5 years ago
- ☆29Updated 11 months ago
- ☆104Updated 3 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- ☆30Updated last year
- The HEBench (homomorphic encryption benchmark) frontend consists of the components relevant to users running benchmarks, extending the te…☆17Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Private Information Retrieval protocol☆44Updated 3 years ago
- GPU/CUDA implementation of Leveled BFV/CKKS/BGV scheme.☆27Updated this week
- ☆178Updated 3 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆169Updated 6 months ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- ☆10Updated 4 years ago
- MOSFHET: Optimized Software for FHE over the Torus☆15Updated 6 months ago
- POC implementation of "Accelerating HE Operations Using Key Decomposition"[KLSS23]☆13Updated last year