kevinlewi / fhipe
An implementation of Function-Hiding Inner Product Encryption
☆44Updated 9 years ago
Alternatives and similar repositories for fhipe:
Users that are interested in fhipe are comparing it to the libraries listed below
- An Implementation of Order-Revealing Encryption☆93Updated 4 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- SHEEP is a Homomorphic Encryption Evaluation Platform☆51Updated last year
- The compiler for ObliVM☆65Updated 4 years ago
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- Experiments in homomorphic encryption☆31Updated 10 years ago
- Optimized implementation of the Picnic signature scheme☆80Updated 2 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆61Updated 7 years ago
- NTT-based Fast Lattice library☆169Updated 2 years ago
- Multi-input functional encryption☆12Updated 7 years ago
- A Language and Compiler for Homomorphic Encryption Made easY☆67Updated 4 years ago
- ☆178Updated 3 years ago
- Global-Scale Secure Multiparty Computation☆44Updated 2 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Functional encryption library in C☆83Updated 4 years ago
- ☆28Updated 5 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- Privacy-preserving auditing for distributed ledgers☆66Updated 6 years ago
- The fully homomorhic encryption scheme based on NTRU and LWE.☆40Updated 6 months ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Oblivious transfer for multiparty computation☆37Updated 5 years ago
- ☆49Updated last year
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- A pure-Rust implementation of the Paillier encryption scheme☆82Updated 6 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 9 months ago
- Post-quantum key exchange from the learning with errors problem — from the paper "Frodo: Take off the ring! Practical, Quantum-Secure Key…☆45Updated 7 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆128Updated 9 years ago
- CUDA Homomorphic Encryption Library☆199Updated 7 years ago
- C implementation of the CLT13 multilinear map☆14Updated 6 years ago