IBM / TSSLinks
Threshold signature schemes made simple to use
☆50Updated 4 months ago
Alternatives and similar repositories for TSS
Users that are interested in TSS are comparing it to the libraries listed below
Sorting:
- 🍵 Schnorr Signatures over Ristretto255 in pure Go☆101Updated 9 months ago
- ☆71Updated 4 months ago
- Threshold signature library across multiple platforms☆45Updated 2 years ago
- ☆128Updated last year
- ☆21Updated 2 years ago
- zkSNARK Groth16 prover & verifier☆38Updated 10 months ago
- High-speed BLS12-381 implementation in Go☆127Updated 2 years ago
- Go EVM extracted from go-ethereum☆46Updated 7 years ago
- 🌁 Sygma core library (ChainBridge)☆101Updated 2 years ago
- Secure Multi-Party Computation (MPC) with Go. This project implements secure two-party computation with Garbled circuit protocol.☆129Updated this week
- Gotham city is a fully functional project to demonstrate real-life example of minimalist Bitcoin decentralized HD wallet using 2 party EC…☆212Updated last year
- This project is a C++ implementation of {t,n}-Threshold Signature Scheme☆127Updated last month
- Go implementation of some cryptographic primitives (that fit inside the SNARK field) and compatible with circomlib☆145Updated last year
- Implementation of the FROST protocol for threshold Ed25519 signing☆75Updated last year
- Golang polkadot substrate scale codec☆68Updated 2 months ago
- ☆48Updated last year
- Substrate RPC client for go aka GSRPC☆209Updated last year
- ☆25Updated this week
- Go core implementation of the iden3 system☆94Updated 2 months ago
- ZRNT - Executable spec for ETH 2.0, implemented in Go☆102Updated 5 months ago
- A go implementation of Verkle trees☆235Updated last month
- An ECDSA threshold signature algorithm implemented in Rust.☆144Updated last year
- A Go library that implements a Sparse Merkle tree for a key-value map.☆141Updated 2 years ago
- State-of-art threshold ECDSA in Rust☆116Updated 2 months ago
- Fast RLP encoder/decoder☆25Updated 2 years ago
- Ethereum infura like service to provide RPC endpoints for Conflux network.☆36Updated this week
- Subkey port in Go☆22Updated 10 months ago
- Practical Byzantium Fault Tolerant (PBFT) algorithm☆39Updated 6 months ago
- Privacy-preserving implementations of fungible and non-fungible tokens, using UTXO as the underlying transaction model☆34Updated last week
- Go implementation of the BIP Schnorr signature scheme.☆70Updated 5 years ago