obliviousram / PathORAM
Path ORAM reference implementation
☆23Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for PathORAM
- Path ORAM is a simple oblivious RAM algorithm. While using cloud platform or any other insecure memory, attack can be made using the acce…☆17Updated 5 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- ☆25Updated last year
- Open-source library for ORAM implementations☆11Updated 4 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- ☆33Updated 4 years ago
- Repository for the SoK paper on Fully Homomorphic Encryption (FHE) compilers.☆74Updated last year
- code for privacy-preserving sat solver☆17Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- POSUP: Oblivious Search and Update Platform with SGX (PETS'19)☆14Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆76Updated 2 years ago
- A high-throughput oblivious storage system☆23Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆94Updated last year
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- A Cryptographic Inference Service for Neural Networks☆125Updated 3 months ago
- Query compiler for secure multi-party computation.☆98Updated 4 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆73Updated 5 months ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆19Updated 8 months ago
- ☆178Updated 3 years ago
- Piranha: A GPU Platform for Secure Computation☆92Updated last year
- ☆104Updated 2 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆17Updated 2 years ago
- Team CEA-EPFL-Inpher: code for the iDash 2018 competition☆21Updated 6 years ago
- Global-Scale Secure Multiparty Computation☆40Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆85Updated last year
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆21Updated 2 years ago
- ☆22Updated 5 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆36Updated 3 years ago
- ☆13Updated 6 years ago