pps-lab / zeph-artifact
Cryptographic Enforcement of End-to-End Data Privacy
☆24Updated 2 years ago
Alternatives and similar repositories for zeph-artifact:
Users that are interested in zeph-artifact are comparing it to the libraries listed below
- ☆28Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- A Cryptographic Inference Service for Neural Networks☆130Updated 8 months ago
- ☆104Updated 3 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆164Updated 2 years ago
- ☆35Updated 4 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- Library for performing Function Secret Sharing (FSS)☆89Updated 6 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆82Updated 3 years ago
- ☆25Updated 2 years ago
- Query compiler for secure multi-party computation.☆98Updated 4 years ago
- ☆12Updated last year
- Private Information Retrieval protocol☆44Updated 4 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆35Updated 3 years ago
- Example implementation of the SealPIR protocol☆146Updated 4 months ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Secure Aggregation for FL☆34Updated last year
- Efficient Private Set Intersection base on VOLE☆125Updated last month
- ☆179Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Global-Scale Secure Multiparty Computation☆44Updated 2 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆26Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- Secure Aggregation for Federated Learning with Malicious Actors☆24Updated 2 years ago
- ☆22Updated 5 years ago