kpatsakis / OrderRevealingEncryptionLinks
This is a simple implementation in Python of the Order Revealing scheme of Chenette et al. For more details refer to the original work:
☆7Updated 4 years ago
Alternatives and similar repositories for OrderRevealingEncryption
Users that are interested in OrderRevealingEncryption are comparing it to the libraries listed below
Sorting:
- This repository Open Source the experimental code of paper "ROSE: Robust Searchable Encryption with Forward and Backward Security"☆11Updated 2 years ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆12Updated last year
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- Practical Verifiable Multi-user Forward Secure Searchable Encryption☆10Updated 3 years ago
- Boolean Query SSE schemes☆16Updated 6 years ago
- Implementation of IM-DSSE framework (IEEE TSC'19)☆11Updated 5 years ago
- DSSE ODXT implemetation, from Forward and Backward Private Conjunctive Searchable Symmetric Encryption by Sikhar Patranabis(ETH Zürich), …☆14Updated last year
- ☆20Updated 6 years ago
- implementation of seren☆13Updated 7 months ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Updated 9 years ago
- The Description of the project you can watch my blog☆35Updated 4 years ago
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆25Updated 3 years ago
- Efficient Multi-User Searchable Encrypted Database☆11Updated 7 months ago
- This repository contains my implementation of the IKK attack as proposed by Islam et al. in their paper 'Access Pattern disclosure on Sea…☆11Updated 2 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- ☆25Updated 2 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- ☆17Updated 4 months ago
- 可编辑区块链,基于以太坊智能合约的区块编辑抽象层,利用变色龙哈希实现对过去区块的修改删除等操作☆14Updated 4 years ago
- A curated list of resources about Searchable Symmetric Encryption (SSE).☆42Updated 4 years ago
- ☆206Updated 4 months ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆480Updated 3 years ago
- Java implementations of two order-preserving encryption algorithms.☆37Updated 11 months ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆10Updated 2 years ago
- ☆119Updated last year
- Somewhat homomorphic encryption over elliptic curve using BGN cryptosystem☆12Updated 3 years ago
- ☆235Updated last month
- Implementation of Partial Order Preserving Encryption☆20Updated 8 years ago
- Multi-party Private Set Intersections & Threshold Set Intersections☆12Updated 4 years ago