mmingluo / kspir
☆11Updated 6 months ago
Alternatives and similar repositories for kspir:
Users that are interested in kspir are comparing it to the libraries listed below
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- This repo provides C++ implementation of FHE-based unbalanced private set union (PSU).☆12Updated 9 months ago
- ☆29Updated 2 years ago
- ☆32Updated last year
- Private Set Union☆14Updated 2 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- ☆67Updated 6 years ago
- Efficient Private Set Intersection base on VOLE☆125Updated 3 weeks ago
- Multi-party Private Set Union☆16Updated last month
- Constant-weight PIR using Constant-weight Equality Operators☆22Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- ☆104Updated 3 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated 2 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆21Updated last year
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆24Updated 11 months ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- ☆20Updated 2 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 3 months ago
- ☆27Updated 6 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- ☆25Updated 2 years ago
- C++ coroutine protocol library.☆11Updated last month
- Circuit PSI using garbled cuckoo filter☆11Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Implementation of Distributed function secret sharing and applications☆11Updated 2 weeks ago
- Implementation of protocols in Falcon☆93Updated 7 months ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- ☆32Updated last month