f7ed / hmmpc-public
Implementation of protocols in the paper titled "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting"
☆14Updated last month
Related projects ⓘ
Alternatives and complementary repositories for hmmpc-public
- Repository for collection of research papers on multi-party learning.☆31Updated last year
- A framework for generic hybrid two-party computation and private inference with neural networks☆30Updated last year
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- ☆18Updated 2 months ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 3 months ago
- Implementation of protocols in Falcon☆89Updated 3 months ago
- ☆35Updated 2 weeks ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆38Updated 5 years ago
- ☆65Updated 6 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆17Updated last year
- Implementation of protocols in SecureNN.☆124Updated 2 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆18Updated 9 months ago
- ☆103Updated 2 years ago
- Multi-party Private Set Union☆16Updated 10 months ago
- A two-party generator for Vector-OLE correlations.☆28Updated 3 years ago
- ☆15Updated last month
- ☆12Updated last year
- ☆32Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆78Updated 3 years ago
- Paper Notes in MPC with Applications to PPML☆65Updated 8 months ago
- MPC team of Security Group in HITSZ☆19Updated 2 months ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- Secure Aggregation for FL☆34Updated last year
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated last year
- FLUTE: Fast and Secure Lookup Table Evaluations☆21Updated 7 months ago
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆16Updated 2 years ago
- ☆27Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆76Updated 2 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆13Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆78Updated 2 years ago