secureldata / Efficient-Integer-Vector-Homomorphic-EncryptionLinks
MIT开发的支持整数向量的同态加密 支持向量的加法,乘法和内积
☆15Updated 5 years ago
Alternatives and similar repositories for Efficient-Integer-Vector-Homomorphic-Encryption
Users that are interested in Efficient-Integer-Vector-Homomorphic-Encryption are comparing it to the libraries listed below
Sorting:
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- Paper Notes in MPC with Applications to PPML☆69Updated last year
- Electronic anonymous voting system based on paillier algorithm☆16Updated 6 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated 10 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- ☆20Updated 6 years ago
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆50Updated 3 weeks ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆31Updated 2 weeks ago
- Private set intersection implemented in Python☆102Updated 3 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆112Updated last year
- Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning☆31Updated last week
- MPC Secure Multiparty Computation. A three-party secret-sharing-based vertical federated learning setting. The data are vertically parti…☆23Updated 5 years ago
- MPC team of Security Group in HITSZ☆20Updated 2 months ago
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆13Updated 4 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆14Updated 3 years ago
- A defunct and ancient set of python bindings for Pairing Based Cryptography☆52Updated last year
- Private Inference on Transformer☆25Updated 2 years ago
- Code repository for the paper at USENIX Security'24☆29Updated 10 months ago
- Fast Privacy-Preserving Machine Learning on the GPU☆84Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆41Updated 6 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- Private Decision Tree Evaluation protocols☆11Updated 5 years ago
- Multi‐key homomorphic encryption based on MKCKKS☆20Updated 3 years ago
- personal implementation of secure aggregation protocol☆46Updated last year
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆21Updated 2 years ago
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆80Updated 11 months ago
- Implementation of Distributed function secret sharing and applications☆13Updated last month
- ☆37Updated 7 months ago
- Symmetric Homomorphic Encryption☆10Updated 2 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago