DSSLab-Tsinghua / waterbearLinks
information-theoretic asynchronous BFT
☆20Updated last year
Alternatives and similar repositories for waterbear
Users that are interested in waterbear are comparing it to the libraries listed below
Sorting:
- ☆11Updated 2 years ago
- BEAT: Asynchronous BFT Made Practical☆16Updated 5 years ago
- ☆206Updated last week
- The Honey Badger of BFT Protocols☆143Updated 3 years ago
- Implementation of two BFT consensus protocols☆17Updated last year
- multi-authority attribute based encryption☆44Updated 4 years ago
- ☆23Updated 3 weeks ago
- Source code for the VLDB21 paper "SlimChain: Scaling Blockchain Transactions through Off-Chain Storage and Parallel Processing"☆47Updated 3 years ago
- Source code for the ICDCS 2022 paper "Dissecting the Performance of Chained-BFT"☆53Updated 2 years ago
- A simple implementation of HotStuff consensus protocol☆18Updated 5 years ago
- Playing around with HotStuff BFT consensus protocol.☆21Updated 5 years ago
- Sample implementation of PBFT consensus algorithm☆231Updated 3 years ago
- Pairing-based cryptography for Go☆101Updated 6 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆40Updated 4 years ago
- Proxy Re-Encryption go implementation☆88Updated 5 years ago
- A general-purpose BFT state machine replication library with modularity and simplicity, suitable for building hybrid consensus cryptocurr…☆272Updated 2 years ago
- ☆22Updated last year
- The Honey Badger of BFT Protocols☆322Updated 5 years ago
- Research implementation of cryptographic accumulators☆30Updated 4 years ago
- ☆62Updated 4 years ago
- Example to create merkle path proof using libsnark☆45Updated 5 years ago
- Functional encryption library in Go☆187Updated 2 years ago
- ☆24Updated 4 years ago
- This is a Sharding Simulator to study blockchain scalability.☆37Updated 3 years ago
- Boneh–Lynn–Shacham signature scheme.☆36Updated 7 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆36Updated 3 years ago
- A Go implementation of the partially homomorphic Paillier Cryptosystem.☆150Updated 6 years ago
- Java Boneh, Lynn, and Shacham (BLS) Signature Aggregation. Implementation of "Aggregate and Verifiably Encrypted Signatures from Bilinear…☆26Updated 7 years ago
- ☆16Updated 6 months ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago