simon-oya / USENIX21-sap-code
Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks
☆15Updated 4 years ago
Alternatives and similar repositories for USENIX21-sap-code:
Users that are interested in USENIX21-sap-code are comparing it to the libraries listed below
- Code to run the evaluation of our "Obfuscated Access and Search Patterns in Searchable Encryption", NDSS'21☆12Updated 4 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- Symmetric-key Hidden Vector Encryption Scheme☆19Updated 6 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆39Updated 6 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆95Updated 3 years ago
- Boolean Query SSE schemes☆15Updated 6 years ago
- ☆28Updated last year
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- NFGen: Automatic Non-Linear Function Evaluation Code Generator for General-purpose MPC Platforms☆19Updated last year
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆86Updated last year
- ☆29Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆82Updated 2 years ago
- 论文阅读与实验 频率隐藏保序加密的数据库 Frequency-hiding order-preserving encryption☆9Updated 2 years ago
- ☆16Updated 2 weeks ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆78Updated 8 months ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- Efficient Private Set Intersection base on VOLE☆125Updated 3 weeks ago
- CloudCryptoSearch is a searchable encryption middleware, allowing the storage, update, and ranked multi-keyword searching of encrypted te…☆11Updated last year
- ☆32Updated last year
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆29Updated 5 years ago
- Input scripts for securely evaluating quantized ImageNet models with mp-spdz☆20Updated 4 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆32Updated 2 years ago
- Non-interactive dynamic searchable encryption scheme with forward and Type-II backward privacy☆14Updated 3 years ago
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- A repo to hold common tools used by my crypto projects☆128Updated last month
- ☆67Updated 6 years ago
- ☆104Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago