Election-Tech-Initiative / electionguard-python
A python module implementing the ElectionGuard specification. This implementation can be used to conduct End-to-End Verifiable Elections as well as privacy-enhanced risk-limiting audits.
☆164Updated last year
Alternatives and similar repositories for electionguard-python:
Users that are interested in electionguard-python are comparing it to the libraries listed below
- ElectionGuard Web API in python to demonstrate usage of electionguard-python in performing ballot encryption, casting, spoiling, and tall…☆36Updated last year
- ElectionGuard is a set of open source software components that can be used to create and publish end to end verifiable elections as well …☆837Updated last month
- A port of electionguard-python to Java.☆11Updated last year
- Core codebase of ElectionGuard 2.0☆13Updated 7 months ago
- A Python implementation of the COSE specification (CBOR Object Signing and Encryption) described in RFC 8152.☆40Updated 7 months ago
- Supply Chain Integrity Transparency and Trust ledger application using Confidential Consortium Framework (CCF)☆38Updated this week
- SCITT API Emulator☆10Updated 5 months ago
- A specification for an HTTP API used to issue and verify Verifiable Credentials.☆127Updated this week
- Use this repo to get to know about other repos and the overall organization of the MOSIP structure☆78Updated 8 months ago
- COMMUNITY: Landing site for W3C Credentials Community Group.☆35Updated last year
- Site for the open source, community-driven group of dev and organizations working toward an interoperable, decentralized identity ecosyst…☆106Updated this week
- Confidential Consortium Framework☆809Updated this week
- Python Implementation of the KERI Core Libraries☆28Updated 2 years ago
- DIF docs, wiki, and organizational material☆48Updated 3 weeks ago
- This is a collection of sidecar containers that can be incorporated within confidential container groups on Azure Container Instances.☆32Updated this week
- Data about packages and maintainers on PyPI☆126Updated last month
- Reference implementation of the Picnic post-quantum signature scheme☆160Updated last year
- Peer DID method implementation in Python☆12Updated last year
- Python WebAuthn Relying Party library☆116Updated 2 years ago
- Confidential AI samples☆41Updated last year
- ACA-Py is a foundation for building decentralized identity applications and services running in non-mobile environments.☆448Updated this week
- ☆13Updated last year
- Confidential Storage Specification and Implementation☆83Updated 2 years ago
- Template repository for CCF apps☆14Updated 3 months ago
- A code sample demonstrating how to use Azure Active Directory's preview functionality to issue and consume verifiable credentials.☆110Updated 7 months ago
- TerminusDB Python Client☆75Updated this week
- Our mission is to catalyze sustainable improvements to critical open source software projects and ecosystems.☆95Updated 2 weeks ago
- ☆14Updated 2 years ago
- An implementation of an auditable key directory☆267Updated 4 months ago
- Decentralize your secrets!☆117Updated 5 years ago