Private set intersection using garbled bloom filters in semi-honest setting
☆26Dec 11, 2015Updated 10 years ago
Alternatives and similar repositories for GarbledBloomFilters
Users that are interested in GarbledBloomFilters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of Multi-Party Threshold Private Set Intersection with Sublinear Communication☆12Feb 2, 2021Updated 5 years ago
- Rust port of c-kzg-4844☆17Jan 24, 2024Updated 2 years ago
- Python library that serves as an API for common cryptographic primitives used to implement OPRF, OT, and PSI protocols.☆27May 8, 2024Updated last year
- This repository is some implementation of ABE (attribute-base encryption) scheme☆20Nov 2, 2020Updated 5 years ago
- LSSS, ABE☆17Dec 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆103Sep 22, 2023Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆84Oct 29, 2022Updated 3 years ago
- A python library for ElGamal-based threshold decryption.☆44Mar 14, 2024Updated 2 years ago
- ☆25Jul 16, 2022Updated 3 years ago
- Golang implementation of JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT☆15Aug 8, 2019Updated 6 years ago
- Publicly Verifiable Secret Sharing, and more...☆28Nov 19, 2025Updated 4 months ago
- 此项目实现了基于CPABE策略的属性加密、生成密钥、解密以及时间复杂度分析,ABE和RSA的共同加密以及时间复杂度分析。☆12May 24, 2022Updated 3 years ago
- An implementation of the decoding of BCH codes resistant to timing attacks☆11Sep 18, 2020Updated 5 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- constant size cp-abe searchable encryptyion scheme☆12Oct 9, 2018Updated 7 years ago
- Implementations of Private Set Intersection Protocols☆189Jun 27, 2025Updated 9 months ago
- Cairo implementation of operations over the elliptic curve BLS12-381☆14Feb 8, 2023Updated 3 years ago
- Cython/Python bindings of E2LSH by Andoni and Symmetric LSH for MIPS by Neyshabur☆15Feb 10, 2016Updated 10 years ago
- Private set intersection implemented in Python☆102Jun 21, 2022Updated 3 years ago
- Monitor Claude Code activity across multiple Zellij panes in real-time via zjstatus.☆28Jan 13, 2026Updated 2 months ago
- JSON-RPC endpoint proxy that dumps requests/responses for debugging☆31Aug 23, 2023Updated 2 years ago
- KD-Tree Implementation in Java via http://www.cs.wlu.edu/~levy/software/kd/☆17Oct 26, 2010Updated 15 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆29Jul 16, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- jPBC fork for get Maven works again☆17Feb 25, 2019Updated 7 years ago
- ☆10Mar 26, 2022Updated 4 years ago
- Heterogeneous Gaussian Mechanism: Preserving Differential Privacy in Deep Learning with Provable Robustness (IJCAI'19).☆13Apr 16, 2021Updated 4 years ago
- Integrating Stone Prover's generated proofs with the Cairo0 verifier☆10Mar 8, 2024Updated 2 years ago
- The Description of the project you can watch my blog☆37Apr 18, 2021Updated 4 years ago
- Computes SHA256 of arbitrary length inputs.☆15Nov 2, 2022Updated 3 years ago
- 可验证外包加解密的基于密文策略属性加密方案的实验仿真系统(Verifiable Outsourcing CPABE experimental simulation system)☆14Sep 18, 2021Updated 4 years ago
- Dynamic Universal Accumulator with Batch Update over Bilinear Groups☆15Sep 13, 2021Updated 4 years ago
- ☆33Dec 30, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cashu Protocol ZK engine. Blind Diffie-Hellmann Key Exchange (BDHKE) implementation in Cairo.☆13Sep 18, 2024Updated last year
- Ceaser Cipher,Autokey,Hill Cipher,MonoAlphabetic,PlayFair Cipher,Rail Fence,Viegenere, Row Transposition☆17Feb 1, 2017Updated 9 years ago
- ☆15Apr 12, 2019Updated 7 years ago
- ☆11Nov 26, 2020Updated 5 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆88Aug 5, 2022Updated 3 years ago
- Solidity compiler of FISCO-BCOS☆15Jan 7, 2019Updated 7 years ago
- 本书是《5G Mobile Networks : A Systems Approach》(https://5g.systemsapproach.org/)的中文版翻译。☆13Jun 26, 2022Updated 3 years ago