Private set intersection using garbled bloom filters in semi-honest setting
☆26Dec 11, 2015Updated 10 years ago
Alternatives and similar repositories for GarbledBloomFilters
Users that are interested in GarbledBloomFilters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Multi-Party Threshold Private Set Intersection with Sublinear Communication☆12Feb 2, 2021Updated 5 years ago
- Implementation of precomputed PSI for smartphone☆12Oct 12, 2017Updated 8 years ago
- Python library that serves as an API for common cryptographic primitives used to implement OPRF, OT, and PSI protocols.☆26May 8, 2024Updated 2 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆21Nov 2, 2020Updated 5 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆103Sep 22, 2023Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆84Oct 29, 2022Updated 3 years ago
- A python library for ElGamal-based threshold decryption.☆44Mar 14, 2024Updated 2 years ago
- ☆25Jul 16, 2022Updated 3 years ago
- Publicly Verifiable Secret Sharing, and more...☆28Nov 19, 2025Updated 6 months ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆11Sep 18, 2020Updated 5 years ago
- Error Correction Codes - C☆11May 26, 2019Updated 6 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An implementation of "The Simplest Oblivious Transfer Protocol"☆28Nov 13, 2018Updated 7 years ago
- constant size cp-abe searchable encryptyion scheme☆12Oct 9, 2018Updated 7 years ago
- Implementations of Private Set Intersection Protocols☆191Jun 27, 2025Updated 10 months ago
- Cairo implementation of operations over the elliptic curve BLS12-381☆14Feb 8, 2023Updated 3 years ago
- Cython/Python bindings of E2LSH by Andoni and Symmetric LSH for MIPS by Neyshabur☆15Feb 10, 2016Updated 10 years ago
- Private set intersection implemented in Python☆102Jun 21, 2022Updated 3 years ago
- JSON-RPC endpoint proxy that dumps requests/responses for debugging☆31Aug 23, 2023Updated 2 years ago
- A Safe module that allows approved addresses to execute transactions after a time delay, during which transactions can be marked as inval…☆27Feb 27, 2026Updated 2 months ago
- Monitor Claude Code activity across multiple Zellij panes in real-time via zjstatus.☆38Jan 13, 2026Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- jPBC fork for get Maven works again☆17Feb 25, 2019Updated 7 years ago
- ☆10Mar 26, 2022Updated 4 years ago
- Confidential Byzantine Fault-Tolerant SMR library☆13Nov 4, 2025Updated 6 months ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 5 years ago
- Integrating Stone Prover's generated proofs with the Cairo0 verifier☆10Mar 8, 2024Updated 2 years ago
- ☆26Sep 6, 2020Updated 5 years ago
- 可验证外包加解密的基于密文策略属性加密方案的实验仿真系统(Verifiable Outsourcing CPABE experimental simulation system)☆14Sep 18, 2021Updated 4 years ago
- Computes SHA256 of arbitrary length inputs.☆15Nov 2, 2022Updated 3 years ago
- Dynamic Universal Accumulator with Batch Update over Bilinear Groups☆15Sep 13, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆33Dec 30, 2022Updated 3 years ago
- Cashu Protocol ZK engine. Blind Diffie-Hellmann Key Exchange (BDHKE) implementation in Cairo.☆13Sep 18, 2024Updated last year
- Ceaser Cipher,Autokey,Hill Cipher,MonoAlphabetic,PlayFair Cipher,Rail Fence,Viegenere, Row Transposition☆17Feb 1, 2017Updated 9 years ago
- ☆15Apr 12, 2019Updated 7 years ago
- ☆11Nov 26, 2020Updated 5 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆88Aug 5, 2022Updated 3 years ago
- Solidity compiler of FISCO-BCOS☆15Jan 7, 2019Updated 7 years ago