tonyo / pyope
Implementation of Boldyreva's symmetric order-preserving encryption in Python
☆98Updated 2 years ago
Alternatives and similar repositories for pyope:
Users that are interested in pyope are comparing it to the libraries listed below
- Implementations of Private Set Intersection Protocols☆178Updated 2 years ago
- Order-preserving encryption in Java☆27Updated 3 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- A repository for private set intersection.☆178Updated last month
- A python library providing several polynomial-based Private Set Intersection protocols.☆43Updated 10 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆77Updated 2 years ago
- ☆112Updated 10 months ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆76Updated 6 months ago
- Example implementation of the SealPIR protocol☆141Updated 2 months ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆167Updated 5 months ago
- The compiler for ObliVM☆65Updated 4 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆96Updated last year
- Implementation of protocols in SecureNN.☆128Updated 2 years ago
- ☆25Updated 6 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆114Updated last year
- ☆55Updated 11 months ago
- Materials about Privacy-Preserving Machine Learning☆234Updated last week
- Private set intersection implemented in Python☆100Updated 2 years ago
- Private Set Intersection Cardinality protocol based on ECDH and Bloom Filters☆137Updated 2 months ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated last year
- The OPE lib extracted from CryptoDb☆17Updated 8 years ago
- ☆54Updated 2 years ago
- A generic Secure Computation API for garbled circuits, SPDZ, etc.☆21Updated last year
- ☆217Updated last week
- ☆178Updated 3 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆74Updated 7 months ago
- Java implementations of two order-preserving encryption algorithms.☆36Updated 6 months ago
- ☆216Updated 3 months ago