jwoogerd / fuzzy_vault
A simplified implementation of the fuzzy vault algorithm for biometric data
☆22Updated 10 years ago
Alternatives and similar repositories for fuzzy_vault:
Users that are interested in fuzzy_vault are comparing it to the libraries listed below
- Privacy mechanisms for decentralized fingerprint-based authentication☆11Updated 4 years ago
- Cryptographic Key Generation from Biometric Data☆13Updated 6 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆11Updated 3 years ago
- A Python implementation of fuzzy extractor.☆57Updated last year
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆21Updated 6 years ago
- This repo contains code/learning resources related to Homomorphic Encryption.☆29Updated 5 years ago
- Python implementation of "Somewhat Practical Fully Homomorphic Encryption"☆22Updated 4 years ago
- ☆35Updated last year
- Private Set Intersection Cardinality protocol based on ECDH and Bloom Filters☆138Updated 3 months ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆41Updated 4 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- Java implementation of an attribute-based encryption scheme☆19Updated 8 years ago
- Homomorphic Encryption in Python☆20Updated 7 years ago
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- An implementation of BGV-FHE scheme☆26Updated 6 years ago
- Prototype implementation of NTRUReEncrypt in Java☆12Updated 8 years ago
- A simple Python implementation of threshold BLS signatures.☆39Updated 9 months ago
- Pure Python Paillier Homomorphic Cryptosystem☆132Updated 6 years ago
- Implementations of Private Set Intersection Protocols☆178Updated 2 years ago
- AFGH Proxy re-encryption for ZeroDB☆21Updated 8 years ago
- 📊 Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case. A. Giannopoulos, D. Mouris M.S…☆20Updated last year
- ☆220Updated 2 weeks ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Updated 6 years ago
- Tricks for Accelerating (encrypted) Prediction As a Service☆19Updated 5 years ago
- C++ OT extension implementation☆126Updated 4 years ago
- Platform for deploying web-based privacy-preserving data surveys using secure multi-party computation (MPC).☆55Updated last year
- Implementation of the DGHV fully homomorphic encryption scheme☆128Updated 8 years ago
- A repo to hold common tools used by my crypto projects☆126Updated 2 weeks ago
- ☆12Updated 4 years ago
- pairing based cryptography☆13Updated 6 years ago