pps-lab / zeph-artifact
Cryptographic Enforcement of End-to-End Data Privacy
☆24Updated 2 years ago
Alternatives and similar repositories for zeph-artifact:
Users that are interested in zeph-artifact are comparing it to the libraries listed below
- ☆28Updated last year
- ☆178Updated 3 years ago
- Library for performing Function Secret Sharing (FSS)☆86Updated 6 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- Fast Privacy-Preserving Machine Learning on the GPU☆79Updated 3 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆80Updated 2 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆54Updated last year
- ☆35Updated 4 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆24Updated 2 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆26Updated last year
- Efficient Private Set Intersection base on VOLE☆119Updated last month
- Private Information Retrieval protocol☆44Updated 3 years ago
- Secure Aggregation for FL☆34Updated last year
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆162Updated last year
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- ☆23Updated 2 years ago
- Example implementation of the SealPIR protocol☆140Updated last month
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- ☆103Updated 3 years ago
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆21Updated 2 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆21Updated 10 months ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆31Updated 4 years ago
- Intel Paillier Cryptosystem Library is an open-source library which provides accelerated performance of a partial homomorphic encryption …☆56Updated 6 months ago