wangxiao1254 / FlexSCLinks
A Flexible Efficient Secure Computation Backend
☆33Updated 7 years ago
Alternatives and similar repositories for FlexSC
Users that are interested in FlexSC are comparing it to the libraries listed below
Sorting:
- The garbled circuit backend for the ObliVM framework☆17Updated 9 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 5 years ago
- The compiler for ObliVM☆65Updated 4 years ago
- Global-Scale Secure Multiparty Computation☆46Updated 2 years ago
- TinyGarble: Logic Synthesis and Sequential Descriptions for Yao's Garbled Circuits☆121Updated last year
- Semi-honest Two Party Computation Based on Garbled Circuits.☆78Updated 2 years ago
- ☆180Updated 4 years ago
- XPIR: Private Information Retrieval for Everyone☆118Updated 3 years ago
- C++ OT extension implementation☆127Updated 4 years ago
- ☆28Updated 5 years ago
- Library implementing the Fan-Vercauteren homomorphic encryption scheme☆61Updated 8 years ago
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Updated 8 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆172Updated 9 months ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 3 years ago
- Implementation of S3ORAM (CCS'17 & ACM TOPS'20)☆19Updated 2 years ago
- ☆50Updated 2 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 4 years ago
- Implementation of Valiant's universal circuit construction optimized for private function evaluation☆42Updated 4 years ago
- Private Information Retrieval protocol☆45Updated 4 years ago
- (Inactive, see readme) Multiparty computation with SPDZ, MASCOT, and Overdrive offline phases☆222Updated 6 years ago
- Library for performing Function Secret Sharing (FSS)☆90Updated 6 years ago
- Example implementation of the SealPIR protocol☆151Updated 7 months ago
- A unified testbed for evaluating different Oblivious RAM☆59Updated 2 years ago
- Query compiler for secure multi-party computation.☆99Updated 4 years ago
- Implementations of Private Set Intersection Protocols☆181Updated 2 years ago
- Homomorphic comparison in leveled homomorphic encryption and its applications☆37Updated 3 years ago
- Implementation of Brakerski's leveled homomorphic encryption system☆43Updated 8 years ago
- ☆23Updated 4 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆185Updated last year
- Implementation of the DGHV fully homomorphic encryption scheme☆129Updated 9 years ago