ucbsky / elsa
Secure Aggregation for Federated Learning with Malicious Actors
☆24Updated 2 years ago
Alternatives and similar repositories for elsa:
Users that are interested in elsa are comparing it to the libraries listed below
- Secure Aggregation for FL☆34Updated last year
- A secure aggregation system for private federated learning☆39Updated 9 months ago
- Paper Notes in MPC with Applications to PPML☆66Updated 11 months ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- ☆83Updated 4 years ago
- ☆28Updated last year
- A secure multi-party computation library based on arithmetic secret sharing and function secret sharing.☆26Updated last month
- A framework for generic hybrid two-party computation and private inference with neural networks☆31Updated 2 years ago
- MPC team of Security Group in HITSZ☆20Updated this week
- ☆36Updated 3 months ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆17Updated 6 months ago
- ☆20Updated 11 months ago
- Repository for collection of research papers on multi-party learning.☆32Updated last year
- Source code for MLSys 2022 submission "LightSecAgg: a Lightweight and Versatile Design for Secure Aggregation in Federated Learning"☆23Updated 3 years ago
- Function-Dependent Preprocessing in MOTION☆13Updated last year
- ☆29Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆80Updated 3 years ago
- Practical Privacy-Preserving K-means Clustering (PETS-2020)☆33Updated 3 years ago
- personal implementation of secure aggregation protocol☆43Updated last year
- IEEE TIFS'20: VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning☆23Updated 2 years ago
- Function secret sharing (FSS) primitives including distributed point functions (DPF) and distributed comparison functions (DCF)☆20Updated this week
- Code repository for the paper at USENIX Security'24☆26Updated 6 months ago
- A two-party generator for Vector-OLE correlations.☆28Updated 4 years ago
- ☆29Updated last month
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Private Decision Tree Evaluation protocols☆11Updated 4 years ago
- MCSI☆13Updated 3 years ago
- The repo of "Efficient 3PC for Binary Circuits with Application to Maliciously-Secure DNN Inference"☆20Updated last year
- ☆103Updated 3 years ago
- Experimental Code for Private Decision Tree Evaluation☆12Updated last year