obliviousram / PathORAM
Path ORAM reference implementation
☆27Updated 4 years ago
Alternatives and similar repositories for PathORAM
Users that are interested in PathORAM are comparing it to the libraries listed below
Sorting:
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- ☆29Updated last year
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆21Updated 6 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated 9 months ago
- Open-source library for ORAM implementations☆11Updated 5 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- A high-throughput oblivious storage system☆26Updated last year
- ☆18Updated 2 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆78Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago
- ☆105Updated 3 years ago
- Piranha: A GPU Platform for Secure Computation☆94Updated 2 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆22Updated 6 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- A relational Multi-Party Computation framework for analytics in untrusted clouds☆29Updated 8 months ago
- ☆32Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆18Updated 2 years ago
- ☆24Updated 5 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆31Updated 3 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆25Updated last year
- ☆67Updated 6 years ago
- ☆36Updated 4 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Incremental Offline/Online PIR☆14Updated last year
- This is code for homomorphic encryption scheme "a Full RNS variant of HEAAN"☆52Updated 6 years ago