jgharehchamani / SSE
☆22Updated 5 years ago
Alternatives and similar repositories for SSE:
Users that are interested in SSE are comparing it to the libraries listed below
- ☆6Updated 3 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆96Updated 3 years ago
- Boolean Query SSE schemes☆14Updated 6 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆10Updated 7 months ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆38Updated 6 years ago
- ☆28Updated last year
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆14Updated 3 years ago
- Multi-party Private Set Union☆16Updated 2 weeks ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆76Updated 7 months ago
- Efficient Private Set Intersection base on VOLE☆120Updated 2 months ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- ☆20Updated 6 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆21Updated 11 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- ☆103Updated 3 years ago
- Path ORAM reference implementation☆23Updated 4 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 2 years ago
- ☆25Updated 4 years ago
- ☆29Updated 2 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆11Updated last year
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago