C, Downloads, Hacking Tools, Private-Membership

Private Set Membership (PSM) – Cryptographic Protocol That Allows Clients To Privately Query

Private Set Membership (PSM) is a cryptographic protocol that allows clients to privately query whether the client’s identifier is a member of a set of identifiers held by a server in a privacy-preserving manner.

At a high level, PSM provides the following privacy guarantees:

  • The server does not learn the client’s queried identifier in the plaintext.
  • The server does not learn whether the client’s query results in a membership or non-membership determination.
  • The querying client does not learn any information about the set of identifiers that are stored by the server beyond whether the querying client’s identifier is a member or not of the server-held set of identifiers. In other words, the querying client learns the bare minimum amount of information which is only the answer of the membership query.


The Private Set Membership library requires the following dependencies:

How to build

In order to run this library, you need to install Bazel, if you don’t have it already. [Follow the instructions for your platform on the Bazel website. Make sure you are installing version 4.2.1 or above.] (https://docs.bazel.build/versions/master/install.html)

You also need to install Git, if you don’t have it already. Follow the instructions for your platform on the Git website.

Once you’ve installed Bazel and Git, open a Terminal and clone the repository into a local folder.

Navigate into the private-membership folder you just created, and build the library and dependencies using Bazel. Note, the library must be built using C++17.

cd private-membership
bazel build ... --cxxopt='-std=c++17'

You may also run all tests (recursively) using the following command:

bazel test ... --cxxopt='-std=c++17'


This is not an officially supported Google product. The software is provided as-is without any guarantees or warranties, express or implied.

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend