tastyproject / tasty
Toolbox for Automatic Secure Two-partY computation
☆10Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for tasty
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- ☆50Updated last year
- Implementation of the Fish and Begol signature schemes☆13Updated 7 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 4 years ago
- Global-Scale Secure Multiparty Computation☆40Updated last year
- A Flexible Efficient Secure Computation Backend☆33Updated 6 years ago
- C++ Library for Mobile Private Contact Discovery☆27Updated 3 years ago
- C++ OT extension implementation☆125Updated 4 years ago
- BGN encryption scheme implementation using Go☆16Updated 4 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆76Updated 2 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆59Updated 8 years ago
- TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Distributed Keygen☆26Updated last year
- A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation☆16Updated 7 years ago
- ☆20Updated 2 years ago
- An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more parties☆85Updated last year
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆161Updated 3 months ago
- ☆178Updated 3 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆81Updated 9 months ago
- SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension (CRYPTO 2019)☆34Updated 2 years ago
- A Python library for private set intersection☆11Updated 4 years ago
- a C++ library for Pretty Good Confidential Transaction System☆14Updated last year
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆95Updated 2 years ago
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆23Updated last year
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆39Updated 3 years ago
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Updated 7 years ago
- Implementation of the ZKB++ proof system☆20Updated 5 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆28Updated 6 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆181Updated last year
- ☆22Updated 8 years ago