sachaservan / private-ann
Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.
☆18Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for private-ann
- Fast Privacy-Preserving Machine Learning on the GPU☆78Updated 3 years ago
- Private Information Retrieval protocol☆42Updated 3 years ago
- ☆24Updated last year
- A two-party generator for Vector-OLE correlations.☆28Updated 3 years ago
- An Implementation of Incremental Distributed Point Functions in C++☆73Updated this week
- Fast, High-Rate Single-Server PIR via FHE Composition☆28Updated 2 years ago
- DPF and PIR based on DPF in C++☆16Updated 3 years ago
- Piranha: A GPU Platform for Secure Computation☆92Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆93Updated last year
- ☆104Updated 2 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆34Updated 3 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆18Updated 9 months ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆76Updated 2 years ago
- Privacy -preserving Neural Networks☆75Updated 5 years ago
- ☆22Updated 2 years ago
- Private Decision Tree Evaluation protocols☆10Updated 4 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆85Updated last year
- Implementation of protocols in Falcon☆89Updated 3 months ago
- ☆65Updated 6 years ago
- ☆27Updated last year
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆77Updated 2 years ago
- Library for performing Function Secret Sharing (FSS)☆84Updated 5 years ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆21Updated 6 months ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 4 years ago
- Example implementation of the SealPIR protocol☆139Updated last year
- Secure Aggregation for Federated Learning with Malicious Actors☆25Updated last year
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆38Updated 5 years ago
- Efficient Private Set Intersection base on VOLE☆111Updated 2 months ago