huhushengwei5151 / MSMLinks
MSM-优化
☆17Updated 9 months ago
Alternatives and similar repositories for MSM
Users that are interested in MSM are comparing it to the libraries listed below
Sorting:
- ☆18Updated 9 months ago
- ☆27Updated 10 months ago
- Secure Aggregation for Federated Learning with Malicious Actors☆28Updated 3 years ago
- Repository for collection of research papers on multi-party learning.☆34Updated 2 years ago
- Materials about Privacy-Preserving Machine Learning☆263Updated 4 months ago
- ☆90Updated 5 years ago
- Experimental Code for Private Decision Tree Evaluation☆16Updated 2 years ago
- A secure aggregation system for private federated learning☆47Updated last year
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- Privacy-preserving Deep Learning based on homomorphic encryption (HE)☆35Updated 4 years ago
- ☆45Updated 9 months ago
- List of papers on cryptography assisted deep learning privacy computation☆17Updated 3 weeks ago
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆20Updated 3 years ago
- MPC team of Security Group in HITSZ☆19Updated last week
- ☆16Updated 2 years ago
- Privacy-Preserving, Accurate and Efficient Inference for Transformers☆33Updated last year
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Updated 8 months ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆57Updated last week
- Single & Multi Key Homomorphic Encryption Library☆19Updated 3 years ago
- Code for Exploiting Unintended Feature Leakage in Collaborative Learning (in Oakland 2019)☆56Updated 6 years ago
- Privacy preserving vertical federated learning for tree-based models☆30Updated 4 years ago
- ☆16Updated last year
- An implementation of Secure Aggregation algorithm based on "Practical Secure Aggregation for Privacy-Preserving Machine Learning (Bonawit…☆91Updated 6 years ago
- A mathematical and code introduction to the BFV Homomorphic Encryption scheme.☆41Updated 3 years ago
- Implementation of Distributed function secret sharing and applications☆15Updated 8 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆37Updated 6 years ago
- Privacy-Preserving Deep Learning via Additively Homomorphic Encryption☆72Updated 5 years ago
- Code repository for the paper at USENIX Security'24☆36Updated last year
- paper code☆28Updated 5 years ago
- Implementation of protocols in SecureNN.☆131Updated 3 years ago