Private set intersection using garbled bloom filters in semi-honest setting
☆26Dec 11, 2015Updated 10 years ago
Alternatives and similar repositories for GarbledBloomFilters
Users that are interested in GarbledBloomFilters are comparing it to the libraries listed below
Sorting:
- Multi-party Private Set Intersections & Threshold Set Intersections☆14Apr 2, 2021Updated 4 years ago
- A python library providing several polynomial-based Private Set Intersection protocols.☆46Oct 19, 2014Updated 11 years ago
- Implementation of Multi-Party Threshold Private Set Intersection with Sublinear Communication☆12Feb 2, 2021Updated 5 years ago
- A repository for private set intersection.☆186Dec 23, 2024Updated last year
- Python library that serves as an API for common cryptographic primitives used to implement OPRF, OT, and PSI protocols.☆28May 8, 2024Updated last year
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆104Sep 22, 2023Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆84Oct 29, 2022Updated 3 years ago
- A python library for ElGamal-based threshold decryption.☆45Mar 14, 2024Updated 2 years ago
- ☆25Jul 16, 2022Updated 3 years ago
- Golang implementation of JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT☆15Aug 8, 2019Updated 6 years ago
- Publicly Verifiable Secret Sharing, and more...☆28Nov 19, 2025Updated 4 months ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆11Sep 18, 2020Updated 5 years ago
- Error Correction Codes - C☆11May 26, 2019Updated 6 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆27Nov 13, 2018Updated 7 years ago
- Cairo implementation of operations over the elliptic curve BLS12-381☆14Feb 8, 2023Updated 3 years ago
- Implementations of Private Set Intersection Protocols☆188Jun 27, 2025Updated 8 months ago
- Cython/Python bindings of E2LSH by Andoni and Symmetric LSH for MIPS by Neyshabur☆15Feb 10, 2016Updated 10 years ago
- Private set intersection implemented in Python☆102Jun 21, 2022Updated 3 years ago
- JSON-RPC endpoint proxy that dumps requests/responses for debugging☆30Aug 23, 2023Updated 2 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆29Jul 16, 2023Updated 2 years ago
- A Performance Analysis and Simulation of BCH Code in Matlab☆13Feb 26, 2022Updated 4 years ago
- ☆10Mar 26, 2022Updated 3 years ago
- Confidential Byzantine Fault-Tolerant SMR library☆13Nov 4, 2025Updated 4 months ago
- Integrating Stone Prover's generated proofs with the Cairo0 verifier☆10Mar 8, 2024Updated 2 years ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- The Description of the project you can watch my blog☆37Apr 18, 2021Updated 4 years ago
- ☆26Sep 6, 2020Updated 5 years ago
- Computes SHA256 of arbitrary length inputs.☆15Nov 2, 2022Updated 3 years ago
- Dynamic Universal Accumulator with Batch Update over Bilinear Groups☆15Sep 13, 2021Updated 4 years ago
- Cashu Protocol ZK engine. Blind Diffie-Hellmann Key Exchange (BDHKE) implementation in Cairo.☆14Sep 18, 2024Updated last year
- ☆33Dec 30, 2022Updated 3 years ago
- Solidity, the Contract-Oriented Programming Language☆11Jun 19, 2024Updated last year
- ☆11Nov 26, 2020Updated 5 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆88Aug 5, 2022Updated 3 years ago
- Solidity compiler of FISCO-BCOS☆15Jan 7, 2019Updated 7 years ago