Skip to content

ArielCyber/Malicious-MPSI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

Malicious_MPSI

Implementation of the PSImple protocol: https://eprint.iacr.org/2021/122

Running the protocol (we used ubuntu 18.04) :

  1. Clone the repository git clone https://github.com/ArielCyber/Malicious_MPSI.git
    Go to the Malicious_MPSI directory, by using the command cd Malicious_MPSI

  2. Run the command sudo bash install.sh

  3. After the installation, a folder named libOTe should be created.
    Run the command sudo cp -r simple/* libOTe/

  4. Go to the libOTe folder, by using the command cd libOTe

  5. clone the google test library, by running the command sudo git clone https://github.com/google/googletest.git

  6. Run the command sudo make. A file named bin/main will be created.

  7. Change the ips in the file ip.txt to the parties' ips.
    Each party will get a number in range [0..(parties-1)], accordingly to the order in the file.

  8. You should change the data in the data.txt, to the data of each party (comma separated numbers).

  9. You can change the parameters in the cfg.txt file.

  10. To activate the protocol-
    Run at every computer the command ./bin/main <party number> cfg.txt

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published