NillionNetwork / nildb
nilDB is the Nillion blind module that supports the SecretVault & SecretDataAnalytics SDKs.
☆12Updated this week
Alternatives and similar repositories for nildb:
Users that are interested in nildb are comparing it to the libraries listed below
- Minimal pure-Python implementation of a secure multi-party computation (MPC) protocol for evaluating arithmetic sum-of-products expressio…☆66Updated 6 months ago
- Pure-Python implementation of a threshold ecdsa signature scheme based on a secure multi-party computation (MPC) protocol for evaluating …☆28Updated last year
- Nada-Numpy is a Python library designed for algebraic operations on NumPy-like array objects on top of Nada DSL and Nillion Network.☆12Updated 4 months ago
- Nada-AI is a Python library designed for ML/AI on top of Nada DSL and Nillion Network.☆21Updated 4 months ago
- Nillion technical reports☆23Updated 2 months ago
- Minimal pure-Python library that implements a basic version of a secure decentralized biometric authentication functionality via a secure…☆13Updated last year
- Learn the Nada language by working with example Nada programs☆12Updated 4 months ago
- An implementation of the 'DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More' protocol.☆28Updated this week
- ☆32Updated last year
- Create MPC apps with TypeScript.☆37Updated last week
- Prototype implementations of various Collaborative zkSNARKs.☆124Updated last year
- A framework to run Fully Homomorphic Encryption computations (especially using the SEAL library) on Trusted Execution Environments, with …☆43Updated 2 years ago
- ☆25Updated 7 months ago
- Reference implementation in Python of Poseidon and optimized Poseidon (Neptune) hash functions☆82Updated last year
- A dapp SDK for the HTTPZ protocol.☆33Updated this week
- ☆76Updated 3 months ago
- ☆35Updated last month
- ED25519 implementation in Circom☆114Updated last year
- Verifiable and confidential computation based on ZKP and FHE, powered by risc0 zkVM.☆82Updated 2 years ago
- Interfaces and implementations of cryptographic primitives, along with R1CS constraints for them☆208Updated last month
- An implementation of a DKG protocol for front-running protection on Anoma.☆82Updated 2 years ago
- Implementation of Canetti-Gennaro-Goldfeder-Makriyannis-Peled threshold signing scheme☆74Updated last week
- Easily encrypt and onboard your sensitive data to Filecoin☆9Updated last year
- Zero-knowledge gadgets for Webb's cross-chain blockchain applications.☆93Updated 2 years ago
- A curated list of awesome Fully Homomorphic Encryption (FHE) x Blockchain resources, libraries, projects, and more.☆44Updated last year
- Benchmarking framework for general purpose zero-knowledge proofs languages and libraries☆101Updated 4 months ago
- Simple implementation of KZG commitments in C☆35Updated 2 years ago
- Recursive SNARKs based on Plonk and Halo☆116Updated 3 years ago
- Implements SNARK-friendly BLS signatures☆84Updated last year
- ☆27Updated last month