nebula-genomics / proxy-re-demo
Re-encryption by proxy and (additive) homomorphic encryption
☆13Updated 6 years ago
Alternatives and similar repositories for proxy-re-demo:
Users that are interested in proxy-re-demo are comparing it to the libraries listed below
- Software for "Secure genome-wide association analysis using multiparty computation", Nature Biotechnology, 2018☆20Updated 6 years ago
- Protocols for Secure Genomic Computation☆12Updated 7 years ago
- Secure Computation Library☆17Updated 7 years ago
- A high-performance, Pythonic framework for secure computing in bioinformatics☆18Updated 3 months ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- An open-source set intersection protocols library written in golang.☆16Updated 2 months ago
- C++ coroutine protocol library.☆11Updated last month
- PRINCESS source code☆11Updated 8 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆34Updated 3 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- Multi-party Private Set Union☆16Updated last year
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- 2-party 1-bit Distributed Point Function for PIR read and/or write☆12Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆119Updated last month
- ☆19Updated 9 months ago
- ☆28Updated 2 years ago
- Functional encryption library in Go☆173Updated last year
- Private Set Union from Symmetric-Key Techniques☆11Updated last year
- ☆12Updated last year
- Vector OLE and zero-knowledge for Z2k. https://ia.cr/2022/819☆16Updated last year
- Library for performing Function Secret Sharing (FSS)☆86Updated 6 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆19Updated last year
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- A library for compressing, encrypting, and querying alignment data.☆15Updated 8 years ago
- ☆20Updated last year
- ☆23Updated 2 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- A file encryption application based on the Identity-based proxy re-encryption☆15Updated 6 years ago