gfanti / P2P-PIR-CppLinks
Modified version of Percy++ PIR simulation by Goldberg, Devet, et al. These modifications enable PIR over databases that are not synchronized.
☆9Updated 10 years ago
Alternatives and similar repositories for P2P-PIR-Cpp
Users that are interested in P2P-PIR-Cpp are comparing it to the libraries listed below
Sorting:
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- Fully Homomorphic Encryption☆28Updated 2 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆186Updated last year
- Implementation of the Fish and Begol signature schemes☆14Updated 7 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- C++ OT extension implementation☆127Updated 4 years ago
- ☆28Updated 5 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 8 years ago
- ☆50Updated 2 years ago
- Monomi designer and planner prototype☆14Updated 10 years ago
- Symmetric somewhat homomorphic encryption library based on DGHV☆27Updated 7 years ago
- Library for performing Function Secret Sharing (FSS)☆90Updated 6 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 3 years ago
- FairplayMP provides secure multiparty computation.☆45Updated 10 years ago
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 8 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- FourQlib is an efficient and portable cryptographic library that provides functions for computing elliptic curve based operations on the …☆86Updated 2 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆96Updated 2 years ago
- Global-Scale Secure Multiparty Computation☆45Updated 2 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- ☆10Updated 11 years ago
- NTT-based Fast Lattice library☆172Updated 2 years ago
- ☆135Updated 5 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Garbled circuits in Python☆25Updated 8 years ago
- An Implementation of Order-Revealing Encryption☆94Updated 4 years ago