There are no reviews yet. Be the first to send feedback to the community and the maintainers!
ABY
ABY - A Framework for Efficient Mixed-protocol Secure Two-party ComputationPSI
Implementations of Private Set Intersection ProtocolsOTExtension
C++ OT extension implementationMOTION
An efficient, user-friendly, modular, and extensible framework for mixed-protocol secure multi-party computation with two or more partiesUC
Implementation of Valiant's universal circuit construction optimized for private function evaluationMOTION2NX
A framework for generic hybrid two-party computation and private inference with neural networksSAFEFL
SAFEFL: MPC-friendly Framework for Private and Robust Federated LearningOPPRF-PSI
FLUTE
FLUTE: Fast and Secure Lookup Table EvaluationsENCRYPTO_utils
Crypto and networking utils used for ABY and OTExtensionLEAKER
LLVM-for-MPC
MobilePSI
Implementation of precomputed PSI for smartphoneRAID-PIR
Multi-Server PIR (CCSW'14)ppDBSCAN
linearPFE
Linear-complexity Private Function Evaluation (PFE) based on homomorphic encryption (as presented at ESORICS'20).PDTE
Private Decision Tree Evaluation protocolstasty
Tool for Automating efficient Secure Two-partY computation protocolsPQ-MPC
Code for "Secure Two-Party Computation in a Quantum World" by N. Büscher, D. Demmler, N. Karvelas, S. Katzenbeisser, J. Krämer, D. Rathee, T. Schneider, and P. Struck, which will appear at ACNS'20.me-sfe
Memory Efficient Secure Function EvaluationFUSE
FUSE: A Framework for Unifying and Optimizing Secure Multi-Party Computation Implementations with Efficient Circuit Storage.GSHADE
Framework for Privacy-Preserving Distance Computation based on Oblivious TransferSoK_ppClustering
SEEC
SEEC: Memory-Safety Meets Efficiency in Secure Two-Party ComputationVASA
VASA: Vector AES Instructions for Security Applicationsmpc-bench
MPC Benchmarking ToolonionPIR
OnionPIR - a privacy-preserving communication servicePrivMail
PrivMail: A Privacy-Preserving Framework for Secure Emailscip-pir
amid
AMI aiD (AMID) - Scanning a system for security or privacy critical data before publishing or when started as Amazon Machine Image (AMI)ppIndoorLocalization
Hashing
Outsourced subtree that contains simple hashing and Cuckoo hashing routinesdp-KRE
Secure and Differentially Private kth Ranked ElementLUC
Implementation of Universal Circuits capable to compute LUT-based circuitsLove Open Source and this site? Check out how you can help us