tf-encrypted / tf-pjc
Bridge between TensorFlow and Google's Private Join and Compute library
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for tf-pjc
- Arbitrary precision integers in TensorFlow☆11Updated last year
- Secure aggregation protocol for TensorFlow Federated☆21Updated 4 years ago
- Bridge between TensorFlow and the Microsoft SEAL homomorphic encryption library☆95Updated 4 years ago
- Function Secret Sharing library for Python and Rust with hardware acceleration☆54Updated last year
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Updated 4 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 4 years ago
- TensorFlow World 2019 Tutorial: Privacy-Preserving Machine Learning with TF Encrypted & PySyft☆46Updated last year
- Privacy -preserving Neural Networks☆75Updated 5 years ago
- A SMPC companion library for Syft☆100Updated last week
- A library for running Functional Encryption on tensors☆41Updated 3 years ago
- A Secure Multiparty Computation (MPC) protocol for computing linear regression on vertically distributed datasets.☆32Updated 5 years ago
- Various material around private machine learning, some associated with blog☆148Updated 5 years ago
- MPC Simulation Framework☆24Updated last year
- Python wrapper for open source Zero Proof Knowledge Library☆29Updated 4 years ago
- Library for performing Function Secret Sharing (FSS)☆85Updated 6 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆60Updated 6 years ago
- A python library providing several polynomial-based Private Set Intersection protocols.☆43Updated 10 years ago
- A curated list of resources for privacy-preserving machine learning☆147Updated 3 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆59Updated 8 years ago
- A tiny, educational library for secure multi-party computation (in pure Python).☆85Updated last year
- Private Information Retrieval protocol☆42Updated 3 years ago
- Private Set Intersection Cardinality protocol based on ECDH and Bloom Filters☆137Updated last week
- Semi-honest Two Party Computation Based on Garbled Circuits.☆76Updated 2 years ago
- Implementation of protocols in Falcon☆89Updated 3 months ago
- ☆54Updated 2 years ago
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆38Updated 7 years ago
- Fast Homomorphic Evaluation of Deep Discretized Neural Networks☆43Updated 7 years ago