ssavvides / jope
Order-preserving encryption in Java
☆27Updated 4 years ago
Alternatives and similar repositories for jope:
Users that are interested in jope are comparing it to the libraries listed below
- Java implementations of two order-preserving encryption algorithms.☆36Updated 8 months ago
- Symmetric Searchable Encryption Library in Pure Java.☆30Updated 9 years ago
- Implementation of Partial Order Preserving Encryption☆19Updated 8 years ago
- ☆222Updated 2 weeks ago
- A repository for private set intersection.☆180Updated 3 months ago
- The OPE lib extracted from CryptoDb☆17Updated 8 years ago
- A Java library for Paillier partially homomorphic encryption.☆81Updated 7 years ago
- 论文阅读与实验 频率隐藏保序加密的数据库 Frequency-hiding order-preserving encryption☆9Updated 2 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆112Updated last year
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆28Updated 5 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- ☆56Updated last year
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆97Updated last year
- C++ OT extension implementation☆126Updated 4 years ago
- A Java implementation of Paillier cryptosystem.☆35Updated 6 years ago
- Implementations of Private Set Intersection Protocols☆179Updated 2 years ago
- Contains Packages for ElGamal, Paillier, Goldweiser-Micali and DGK Homomorphic Encryption System. Also implements secure multiplication, …☆53Updated 11 months ago
- Boolean Query SSE schemes☆15Updated 6 years ago
- C++ coroutine protocol library.☆11Updated last month
- A Three Party MPC framework for Machine learning and Databases☆210Updated 2 weeks ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆184Updated 4 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆277Updated 2 months ago
- Implementation of protocols in SecureNN.☆129Updated 2 years ago
- ☆26Updated 4 years ago
- Privacy -preserving Neural Networks☆78Updated 6 years ago
- ☆104Updated 3 years ago
- ☆25Updated 6 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Updated 6 years ago
- ☆11Updated 6 months ago