ZeyuThomasLiu / ObliviousMessageRetrievalLinks
☆15Updated 3 years ago
Alternatives and similar repositories for ObliviousMessageRetrieval
Users that are interested in ObliviousMessageRetrieval are comparing it to the libraries listed below
Sorting:
- Implementation of the ZKB++ proof system☆19Updated 6 years ago
- C++ codebase for highly composable zkSNARKs with commit-and-prove capabilities.☆39Updated 4 years ago
- Libra zero knowledge proof system☆54Updated 2 years ago
- Piano: Extremely Simple, Single-server Private Information Retrieval with Sublinear Server Computation☆34Updated 11 months ago
- An implementation of a post quantum anonymous credential scheme☆15Updated 8 months ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- A zk-SNARK for randomized algorithms + linear-size universal circuits (https://eprint.iacr.org/2020/278)☆18Updated 4 years ago
- A ZKP-augmented fork of the OpenFHE library☆19Updated last year
- Elliptic curve search experiments☆35Updated 2 years ago
- Falcon signature and its ZKP extensions☆20Updated 3 years ago
- C++ library for IOP-based zkSNARKs☆171Updated last year
- An elastic proof system based on arkworks☆85Updated last year
- Curve ecGFp5☆68Updated 3 years ago
- Algorand's reference implementation of bls signature scheme☆50Updated 2 years ago
- An implementation of the Rinocchio protocol (SNARK for Ring Arithmetic) over SEAL FHE ring elements☆38Updated last year
- Implementation of the Fish and Begol signature schemes☆14Updated 8 years ago
- Hyrax reference implementation: meta-repo with top-level makefile, etc☆37Updated 7 years ago
- ☆32Updated 10 months ago
- ZPrize 2022 - All qualified entries☆55Updated last year
- SageMath library for constructing elliptic curves☆71Updated 2 years ago
- Pointcheval Sanders signature☆27Updated 5 years ago
- Multiprecision arithmetic & RSA accumulators, within SNARKs☆54Updated last year
- OpenCL code generator for finite-field arithmetic over arbitrary prime fields☆99Updated last month
- ☆10Updated last year
- ☆29Updated 2 years ago
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 5 years ago
- Implementation of the Groth16 zk-SNARK proving system☆21Updated 7 years ago
- Fast 4 way vectorized ladder for the complete set of Montgomery curves☆11Updated 6 years ago
- ☆51Updated 2 years ago
- ☆11Updated 2 years ago