ucbrise / jedi-protocol-goLinks
Golang implementation of JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
☆15Updated 6 years ago
Alternatives and similar repositories for jedi-protocol-go
Users that are interested in jedi-protocol-go are comparing it to the libraries listed below
Sorting:
- Go, C++, and C implementation of a bilinear group and pairing-based cryptography for both embedded and non-embedded systems☆38Updated 2 years ago
- A Flexible Efficient Secure Computation Backend☆33Updated 7 years ago
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- HAL: A Library for Homomorphic Authentication☆21Updated 8 years ago
- XPIR: Private Information Retrieval for Everyone☆119Updated 4 years ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 9 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 5 years ago
- A decentralized privacy-preserving data sharing tool☆31Updated 4 years ago
- The compiler for ObliVM☆65Updated 5 years ago
- Code that accompanies the paper "Lightweight Techniques for Private Heavy Hitters" at IEEE S&P 2021.☆27Updated 2 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- Rainbow signature system for Round THREE submission☆20Updated 5 years ago
- Optimized implementation of the Picnic signature scheme☆82Updated 3 years ago
- rabe is an Attribute Based Encryption library, written in Rust☆88Updated 8 months ago
- ☆28Updated 6 years ago
- Implementation of the DGHV fully homomorphic encryption scheme☆131Updated 9 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆43Updated 4 years ago
- Prototype implementation of Prio, a system for the private computation of aggregate statistics.☆64Updated 7 years ago
- A suite of rust libraries for secure multi-party computation☆326Updated 2 months ago
- ☆23Updated 4 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 3 years ago
- MAYO C implementation☆19Updated 7 months ago
- Experiments with Universal Composability in EasyCrypt☆41Updated last week
- Oblivious transfer library for rust☆11Updated 5 years ago
- An Implementation of Order-Revealing Encryption☆100Updated 5 years ago
- Sapphire source code☆10Updated 8 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- ☆184Updated 4 years ago
- C++ implementation of VSS using LWE encryption and proofs☆15Updated 4 years ago
- ☆37Updated 5 years ago