simon-oya / NDSS21-osse-evaluationLinks
Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21
☆13Updated 4 years ago
Alternatives and similar repositories for NDSS21-osse-evaluation
Users that are interested in NDSS21-osse-evaluation are comparing it to the libraries listed below
Sorting:
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated last year
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Updated 7 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆20Updated last month
- Repository for collection of research papers on multi-party learning.☆33Updated 2 years ago
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆35Updated last month
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆38Updated 5 years ago
- Materials about Privacy-Preserving Machine Learning☆257Updated this week
- ☆31Updated 2 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- ☆37Updated 10 months ago
- Paper Notes in MPC with Applications to PPML☆71Updated last year
- FudanMPL 2.0, a series of multi-party learning frameworks, with rich features, including secure and fast XGBoost, secure Fine-tuning for …☆52Updated last month
- Code repository for the paper at USENIX Security'24☆32Updated last year
- Verifiable Forward Secure SSE scheme☆11Updated 5 years ago
- ☆10Updated 2 years ago
- Implementation of Distributed function secret sharing and applications☆14Updated 4 months ago
- The repo of "BumbleBee: Secure Two-party Inference Framework for Large Transformers" (NDSS 2025)☆44Updated 7 months ago
- Low-Interaction Privacy-Preserving Deep Learning via Function Secret Sharing☆51Updated 4 years ago
- Implementation of protocols in SecureNN.☆131Updated 2 years ago
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- A framework for secure, handy, accurate, and fast transformer inference☆18Updated 3 weeks ago
- Efficient Secure Computation Protocols for Trigonometric Functions via Function Secret Sharing☆21Updated 2 years ago
- Python implementation of some existing functional encryption schemes for the inner product functionality☆15Updated 3 years ago
- MPC team of Security Group in HITSZ☆20Updated last month
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- Implementation of protocols in Falcon☆95Updated last year
- ☆240Updated 3 months ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- ☆124Updated 2 weeks ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆99Updated last year