ssavvides / symmetriaLinks
Symmetric Partial Homomorphic Encryption
☆11Updated 4 years ago
Alternatives and similar repositories for symmetria
Users that are interested in symmetria are comparing it to the libraries listed below
Sorting:
- ☆30Updated last year
- Function Secret Sharing library for Python and Rust with hardware acceleration (PETS '22)☆58Updated last year
- ☆25Updated 2 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆33Updated 3 years ago
- Implementation of SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.☆19Updated 2 years ago
- ☆105Updated 3 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Multi-party Private Set Union☆18Updated 4 months ago
- FLUTE: Fast and Secure Lookup Table Evaluations☆25Updated last year
- Library for performing Function Secret Sharing (FSS)☆90Updated 6 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆84Updated 4 years ago
- A two-party generator for Vector-OLE correlations.☆29Updated 4 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Updated 6 months ago
- ☆67Updated 6 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Constant-weight PIR using Constant-weight Equality Operators☆23Updated 3 years ago
- ☆56Updated 3 years ago
- An implementation of (Unbalanced, Labeled) Private Set Intersection based on homomorphic encryption using Microsoft SEAL.☆29Updated 6 years ago
- ☆19Updated 3 years ago
- ☆13Updated 9 months ago
- DPF and PIR based on DPF in C++☆20Updated 4 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 4 years ago
- Cryptographic Enforcement of End-to-End Data Privacy☆25Updated 2 years ago
- A framework for generic hybrid two-party computation and private inference with neural networks☆33Updated 2 years ago
- Private approximate nearest neighbor search protocol based on locality-sensitive hashing and distributed point functions.☆26Updated last year
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆28Updated 4 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆34Updated 4 years ago
- ☆37Updated 7 months ago