jerry-luo-zl / Searchable-encryption-SerenLinks
implementation of seren
☆13Updated 7 months ago
Alternatives and similar repositories for Searchable-encryption-Seren
Users that are interested in Searchable-encryption-Seren are comparing it to the libraries listed below
Sorting:
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Updated 2 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated last year
- This is a simple implementation in Python of the Order Revealing scheme of Chenette et al. For more details refer to the original work:☆7Updated 4 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- Boolean Query SSE schemes☆16Updated 6 years ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- ☆20Updated 6 years ago
- Practical Verifiable Multi-user Forward Secure Searchable Encryption☆10Updated 3 years ago
- Code repository for the paper at USENIX Security'24☆29Updated 11 months ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Updated 3 years ago
- Efficient Multi-User Searchable Encrypted Database☆11Updated 7 months ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- This repository contains my implementation of the IKK attack as proposed by Islam et al. in their paper 'Access Pattern disclosure on Sea…☆11Updated 2 years ago
- ☆17Updated 4 months ago
- Non-interactive protocol for secure transformer inference based on RNS-CKKS.☆113Updated 10 months ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Updated 5 years ago
- 基于全同态加密的安全人脸识别系统/Secure Face Recognition System based on Fully Homomorphic Encryption☆146Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆161Updated 3 weeks ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆31Updated this week
- MIT开发的支持整数向量的同态加密 支持向量的加法,乘法和内积☆15Updated 5 years ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆52Updated last week
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- 一种基于全同态加密技术的医疗隐私保密系统,是一个较为成熟的项目,公开源代码实现,小组成员如下:王子旭、许嘉晨、夏萌、王宏任☆62Updated 6 years ago
- 南开大学汇编语言与逆向技术课程的作业和代码☆10Updated last year
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆42Updated 5 months ago
- Paper Notes in MPC with Applications to PPML☆69Updated last year