TinyLEGO
Secure Computation Protocol
An implementation of a cryptographic protocol for secure two-party computation
A C++ implementation of the TinyLEGO cryptographic protocol [NST17] for general secure two-party computation
16 stars
4 watching
5 forks
Language: C++
last commit: over 7 years ago Related projects:
Repository | Description | Stars |
---|---|---|
aarhuscrypto/duplo | A cryptographic protocol implementation for secure computation | 22 |
aarhuscrypto/splitcommit | A portable C++ implementation of the recent UC-secure additively homomorphic commitment scheme | 10 |
kennysong/tinysmpc | A tiny Python library for collaborative secure multi-party computation on private data | 87 |
encryptogroup/aby | A framework for efficient mixed-protocol secure two-party computation | 465 |
bristolcrypto/apricot | A cryptographic library implementing a protocol for secure multi-party computation | 16 |
encryptogroup/tasty | Automates efficient Secure Two-partY computation protocols using garbled circuits and homomorphic encryption techniques | 10 |
jedisct1/libhydrogen | A lightweight cryptographic library providing simple functions to solve common problems. | 637 |
haskell-cryptography/cacophony | A Haskell library implementing cryptographic protocols for secure communication. | 96 |
sgl0v/scrypto | Provides a Swift interface to CommonCrypto routines for cryptographic tasks | 38 |
encryptogroup/psi | An implementation of Private Set Intersection protocols for secure data sharing | 177 |
novotnyllc/bc-csharp | A C# implementation of cryptographic algorithms and protocols | 176 |
0xpolygonzero/plonky2 | A Rust implementation of a cryptographic protocol for secure multi-party computation and proof systems | 791 |
cryptobiu/semi-honest-bmr | A C++ implementation of the semi-honest secure BMR protocol for multi-party computation. | 5 |
xavierleroy/cryptokit | A comprehensive C library of cryptographic primitives for building secure protocols in OCaml applications. | 97 |
secretflow/yacl | A C++ library providing common cryptography and network functionality for secure computation protocols | 80 |