Publicly Verifiable Secret Sharing, and more...
☆28Nov 19, 2025Updated 4 months ago
Alternatives and similar repositories for pvss
Users that are interested in pvss are comparing it to the libraries listed below
Sorting:
- PVSS & Scrape in rust☆11Aug 14, 2025Updated 7 months ago
- Python implementation of the HydRand protocol☆18Oct 18, 2022Updated 3 years ago
- Homomorphic Encryption Randomness Beacon☆13Dec 3, 2019Updated 6 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Randhound and Randherd implementation for IEEE SnP '17 paper☆16Jul 11, 2017Updated 8 years ago
- MPC implementation of proof of custody☆32Jun 22, 2021Updated 4 years ago
- ☆10Sep 5, 2023Updated 2 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Oct 20, 2019Updated 6 years ago
- Simple RSA VDF in Rust☆21Apr 13, 2021Updated 4 years ago
- ☆11Jul 21, 2023Updated 2 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆13Jan 16, 2020Updated 6 years ago
- Artifacts for the "Minerva: The curse of ECDSA nonces" paper at CHES 2020☆33Jun 6, 2022Updated 3 years ago
- Alternative implementation of the contributor-client for the Ethereum KZG Trusted Setup Ceremony☆15Jan 28, 2023Updated 3 years ago
- ☆22Sep 6, 2016Updated 9 years ago
- C++ implementation of Distributed Verifiable Random Functions☆25Feb 17, 2020Updated 6 years ago
- The library implements a simple Publicly Verifiable Secret Sharing(PVSS) scheme in Rust.☆27Updated this week
- Implementation of precomputed PSI for smartphone☆12Oct 12, 2017Updated 8 years ago
- Confidential Byzantine Fault-Tolerant SMR library☆13Nov 4, 2025Updated 4 months ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆98Sep 10, 2022Updated 3 years ago
- The first go implementation of verifiable delay function (VDF)☆55Sep 24, 2019Updated 6 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Feb 7, 2024Updated 2 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Dec 11, 2015Updated 10 years ago
- FFT, data-recovery and KZG commitments, a.k.a. Kate commitments, in Go - *super experimental*☆94Nov 29, 2023Updated 2 years ago
- A PoC implementation of a multiparty vault architecture☆29Jan 31, 2021Updated 5 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago
- primitives and protocols for implementing privacy preserving networks☆16Jan 18, 2019Updated 7 years ago
- message signing and verifying for Lightning Network☆11Jan 6, 2023Updated 3 years ago
- translator for fabric block☆15May 5, 2023Updated 2 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆14Oct 19, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Aug 13, 2020Updated 5 years ago
- Bindings to lib-secp256k1 for golang☆29Sep 20, 2017Updated 8 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- JavaScript library for IRIS Hub and Cosmos Hub☆22Jan 18, 2021Updated 5 years ago
- Polkadot Protocol Conformance Tests☆10May 22, 2023Updated 2 years ago
- Interesting and useful CKB scripts which aren't necessarily in system scripts☆15Dec 17, 2025Updated 3 months ago