ladnir / Ivory-Runtime
A generic Secure Computation API for garbled circuits, SPDZ, etc.
☆21Updated last year
Alternatives and similar repositories for Ivory-Runtime:
Users that are interested in Ivory-Runtime are comparing it to the libraries listed below
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- A repository for private set intersection.☆180Updated 2 months ago
- Efficient Private Set Intersection base on VOLE☆125Updated last week
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- C++ OT extension implementation☆126Updated 4 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- ☆24Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆169Updated 6 months ago
- ☆178Updated 3 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- A Three Party MPC framework for Machine learning and Databases☆209Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- ☆220Updated last month
- Implementations of Private Set Intersection Protocols☆179Updated 2 years ago
- Private Set Union☆14Updated 2 years ago
- Private Information Retrieval protocol☆44Updated 3 years ago
- A repo to hold common tools used by my crypto projects☆128Updated 2 weeks ago
- Implementation of protocols in SecureNN.☆130Updated 2 years ago
- ☆67Updated 6 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- ☆20Updated 2 years ago
- ☆34Updated 4 years ago
- Implementation of protocols in Falcon☆93Updated 7 months ago
- Library for performing Function Secret Sharing (FSS)☆88Updated 6 years ago
- ☆29Updated 2 years ago
- Example implementation of the SealPIR protocol☆142Updated 3 months ago