tonyo / pyope
Implementation of Boldyreva's symmetric order-preserving encryption in Python
☆96Updated last year
Related projects ⓘ
Alternatives and complementary repositories for pyope
- ☆24Updated 6 years ago
- Implementation of Partial Order Preserving Encryption☆20Updated 7 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆94Updated last year
- Order-preserving encryption in Java☆26Updated 3 years ago
- A repository for private set intersection.☆174Updated last year
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆94Updated 3 years ago
- Implementations of Private Set Intersection Protocols☆178Updated 2 years ago
- Canonical repository https://git.dbogatov.org/bu/ore-benchmark/Project-Code☆20Updated last year
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆85Updated 2 years ago
- An Implementation of Order-Revealing Encryption☆91Updated 4 years ago
- Query compiler for secure multi-party computation.☆98Updated 4 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆35Updated 6 years ago
- ☆53Updated 9 months ago
- A C++ library containing both easy-to-use lower level bigint/ecgroup interfaces and high-level cryptographical schemes/protocols.☆75Updated 4 months ago
- Symmetric Partial Homomorphic Encryption☆10Updated 4 years ago
- The Description of the project you can watch my blog☆33Updated 3 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- ☆110Updated 8 months ago
- Library for performing Function Secret Sharing (FSS)☆85Updated 6 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆111Updated last year
- System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.☆21Updated 2 years ago
- ☆54Updated 2 years ago
- Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016)☆78Updated 2 years ago
- An encryption scheme for text data allowing a server to store, search and return encrypted data without knowing the content of that data.…☆56Updated 7 years ago
- Boolean Query SSE schemes☆14Updated 6 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆76Updated 2 years ago
- A repo to hold common tools used by my crypto projects☆117Updated 3 weeks ago
- SQLite database inside a secure Intel SGX enclave (Linux)☆60Updated 6 years ago
- Secure Logistic Regression based on Homomorphic Encryption☆43Updated 5 years ago
- Example implementation of the SealPIR protocol☆140Updated this week