jgharehchamani / OS-SSELinks
OSSE and LLSE: two SSE schemes with optimal and quasi-optiaml search time
☆11Updated 3 years ago
Alternatives and similar repositories for OS-SSE
Users that are interested in OS-SSE are comparing it to the libraries listed below
Sorting:
- Efficient Multi-User Searchable Encrypted Database☆11Updated 7 months ago
- ☆25Updated 6 years ago
- ☆7Updated 3 years ago
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- This repository contains my implementation of the IKK attack as proposed by Islam et al. in their paper 'Access Pattern disclosure on Sea…☆11Updated 2 years ago
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Updated 2 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated last year
- ☆36Updated 4 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Updated 4 years ago
- Intel HEXL library backend for OpenFHE, which uses AVX-512 instructions to accelerate the execution of OpenFHE cryptographic capabilities…☆18Updated this week
- Boolean Query SSE schemes☆16Updated 6 years ago
- A high-throughput oblivious storage system☆26Updated 2 years ago
- ☆20Updated 6 years ago
- Path ORAM reference implementation☆29Updated 4 years ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Updated 5 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆27Updated last year
- Practical Verifiable Multi-user Forward Secure Searchable Encryption☆10Updated 3 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- The Intel Homomorphic Encryption (HE) toolkit is the primordial vehicle for the continuous distribution of the Intel HE technological in…☆120Updated 2 months ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆76Updated last year
- Multi-Authority Policy-based Chameleon Hash☆14Updated 4 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆80Updated 2 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆60Updated 8 years ago
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline☆17Updated 2 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆99Updated 4 years ago
- ☆17Updated 4 months ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆12Updated 4 years ago