haochenuw / algorithms-in-SEAL
Some algorithms for computation on encrypted data based on Microsoft SEAL
☆27Updated 4 years ago
Alternatives and similar repositories for algorithms-in-SEAL:
Users that are interested in algorithms-in-SEAL are comparing it to the libraries listed below
- ☆66Updated 6 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- ☆103Updated 3 years ago
- Homomorphic matrix computation☆41Updated 5 years ago
- Private AI Bootcamp was hosted by Microsoft in Redmond, WA on Dec 2nd-4th, 2019. This repository contains materials offered at the event,…☆33Updated 4 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- My Final Year Project using Microsoft SEAL: Logistic Regression over Encrypted Data.☆30Updated 3 years ago
- ☆27Updated 6 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆77Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- ☆32Updated last year
- ☆23Updated 2 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Updated 5 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆79Updated 3 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆15Updated 3 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- Private Information Retrieval protocol☆44Updated 3 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- Implementation of protocols in Falcon☆93Updated 6 months ago
- ☆39Updated 2 months ago
- Experimental Code for Private Decision Tree Evaluation☆12Updated last year
- ☆28Updated last year
- Implementation of protocols in SecureNN.☆128Updated 2 years ago
- ☆20Updated 2 years ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆18Updated 3 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago