Python implementation of the TPC protocol from the paper "Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"
-
Updated
Jun 1, 2019 - Python
Python implementation of the TPC protocol from the paper "Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation"
Secure implementations of Edit Distance algorithms using EMP-toolkit garbled circuits
Source code repository for USENIX '25 paper "FABLE: Batched Evaluation on Confidential Lookup Tables in 2PC"
Add a description, image, and links to the two-party-computation topic page so that developers can more easily learn about it.
To associate your repository with the two-party-computation topic, visit your repo's landing page and select "manage topics."