hedglinnolan / GSW-Homomorphic-Encryption-PythonLinks
MIT 6.857 Group Project
☆10Updated 6 years ago
Alternatives and similar repositories for GSW-Homomorphic-Encryption-Python
Users that are interested in GSW-Homomorphic-Encryption-Python are comparing it to the libraries listed below
Sorting:
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆491Updated 3 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆49Updated 5 years ago
- A fast, portable, and easy to use Oblivious Transfer Library☆484Updated last week
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- ☆240Updated 2 months ago
- Materials about Privacy-Preserving Machine Learning☆263Updated this week
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆57Updated 2 weeks ago
- ☆129Updated 5 months ago
- A Three Party MPC framework for Machine learning and Databases☆211Updated 10 months ago
- Example implementation of the SealPIR protocol☆156Updated last year
- Microsoft SEAL 4.X For Python☆348Updated last year
- Repository for collection of research papers on multi-party learning.☆34Updated 2 years ago
- ☆442Updated last year
- Client/Server framework for encrypted machine learning using homomorphic encryption☆43Updated 4 years ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆82Updated 4 months ago
- Implementation of protocols in Falcon☆95Updated last year
- C++ OT extension implementation☆128Updated 5 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- ☆110Updated 4 years ago
- Sample code and build environments for MPC frameworks☆521Updated last year
- Fast Homomorphic Evaluation of Deep Discretized Neural Networks☆45Updated 8 years ago
- Homomorphic matrix computation☆43Updated 6 years ago
- Code repository for the paper at USENIX Security'24☆37Updated last year
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆183Updated 2 months ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆102Updated 2 years ago
- ☆38Updated last year
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆41Updated 3 years ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆83Updated 3 years ago
- Private Inference on Transformer