tastyproject / tasty
Toolbox for Automatic Secure Two-partY computation
☆10Updated 8 years ago
Alternatives and similar repositories for tasty:
Users that are interested in tasty are comparing it to the libraries listed below
- ☆20Updated 2 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Tool for Automating efficient Secure Two-partY computation protocols☆10Updated 8 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- Implementation of the ZKB++ proof system☆19Updated 5 years ago
- Global-Scale Secure Multiparty Computation☆44Updated 2 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- C++ codebase for highly composable zkSNARKs with commit-and-prove capabilities.☆38Updated 4 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Updated 8 years ago
- ☆12Updated last year
- ☆49Updated last year
- C++ OT extension implementation☆127Updated 4 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆28Updated 6 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆25Updated 9 years ago
- Fast, High-Rate Single-Server PIR via FHE Composition☆30Updated 2 years ago
- Constant-weight PIR using Constant-weight Equality Operators☆23Updated 2 years ago
- A generic Secure Computation API for garbled circuits, SPDZ, etc.☆21Updated last year
- ☆222Updated 2 months ago
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆26Updated 2 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆183Updated last year
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆18Updated 2 years ago
- Library for performing Function Secret Sharing (FSS)☆89Updated 6 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago
- Efficient Private Set Intersection base on VOLE☆125Updated last month
- ☆178Updated 3 years ago
- ☆18Updated 2 weeks ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆32Updated last year