haochenuw / algorithms-in-SEAL
Some algorithms for computation on encrypted data based on Microsoft SEAL
☆27Updated 4 years ago
Alternatives and similar repositories for algorithms-in-SEAL:
Users that are interested in algorithms-in-SEAL are comparing it to the libraries listed below
- ☆67Updated 6 years ago
- ☆104Updated 3 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- Homomorphic matrix computation☆42Updated 5 years ago
- Private AI Bootcamp was hosted by Microsoft in Redmond, WA on Dec 2nd-4th, 2019. This repository contains materials offered at the event,…☆33Updated 4 years ago
- ☆27Updated 6 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- My Final Year Project using Microsoft SEAL: Logistic Regression over Encrypted Data.☆32Updated 3 years ago
- ☆25Updated 2 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- ☆32Updated last year
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- Fast Homomorphic Evaluation of Deep Discretized Neural Networks☆44Updated 7 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆44Updated 5 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- ☆11Updated 7 months ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated 9 months ago
- Experimental Code for Private Decision Tree Evaluation☆12Updated last year
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆18Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- A crypto-assisted framework for protecting the privacy of models and queries in inference.☆19Updated 3 years ago
- Implementation of protocols in Falcon☆93Updated 8 months ago
- Private Information Retrieval protocol☆45Updated 4 years ago
- Key recovery attacks against the CKKS homomorphic approximate encryption scheme☆16Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago