A two-party secure function evaluation using Yao's garbled circuit protocol (extended)
-
Updated
May 11, 2023 - Python
A two-party secure function evaluation using Yao's garbled circuit protocol (extended)
A collection of algorithms to perform join between two or more parties while preserving the privacy of the identifiers
Testbed for machine learning algorithms using the FRESCO framework
This article uses a simple use case involving a transaction between a vendor and a customer to illustrate the privacy-enhancing potential of oblivious transfer (OT) and to demonstrate how OT can be incorporated into a Python implementation of a web service by leveraging the otc library.
Secure Comparison protocol using Paillier and Elliptic-curve-El-Gamal
A fast circuit compiler that can seamlessly integrate with existing Julia code and can incrementally build up expressions and regenerate optimized circuits after substitutions and manipulations using standard Julia functions.
Yao’s Garbled Circuits in TypeScript
Loop Parallelization for MPC
Document Template based on Multipart MIME Content Types
A small repository to contain all the resources of MPC and DP used by me to develop background for IBM Research collab project
Webpage describing the effort and listing contributed documents and artifacts.
Data structure and message format standards and conventions for implementations of garbled gate protocols.
Data structure for representing secret shares of byte vectors based on bitwise XOR, designed for use within secure multi-party computation (MPC) protocol implementations.
Transpiler to convert Javascript to Jiff code
Efficient Darkpool Trading System Based on Blockchain Technology
This repository is for ECE/CS 498AM Applied Cryptography at University of Illinois at Urbana-Champaign
Java implementation of Shoup's Practical Threshold Signature
Easy-to-deploy oblivious pseudo-random function (OPRF) service that allows other parties (typically participants in some secure multi-party computation protocol) to obtain a persistent mask which they cannot decrypt but which they can safely apply (via requests to the service) to private data values of their choice.
A prototype implementation of Shoup's threshold RSA
Add a description, image, and links to the multiparty-computation topic page so that developers can more easily learn about it.
To associate your repository with the multiparty-computation topic, visit your repo's landing page and select "manage topics."