alinush / libvectcom
An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algorithm for computing all N proofs in KZG-based VCs. Lastly, benchmarks.
☆13Updated 4 years ago
Alternatives and similar repositories for libvectcom:
Users that are interested in libvectcom are comparing it to the libraries listed below
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Updated 3 years ago
- ☆15Updated 4 years ago
- A rusty implementation of the Caulk+ lookup algorithm.☆12Updated 2 years ago
- Elliptic curve search experiments☆35Updated 2 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 2 years ago
- Blind signatures over elliptic curve implementation (native & r1cs constraints).☆13Updated 2 years ago
- ☆18Updated 4 years ago
- Rust library for accumulation schemes☆23Updated 2 years ago
- fft impl for ff::Field☆16Updated 11 months ago
- ☆11Updated last year
- snarkpack for arkwork☆21Updated last year
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆15Updated 5 years ago
- [wip] implementing origami VDF☆13Updated 2 years ago
- ☆28Updated 2 years ago
- Groth16 zkSNARK bellman proof verifier using cloudflare/bn256 Pairing☆13Updated 5 years ago
- R1CS constraints for non-native field arithmetic☆20Updated 3 years ago
- Draft documents for standardization of Plonkish arithmetization☆23Updated last year
- ☆15Updated 3 years ago
- ☆26Updated 2 years ago
- RISC Zero Nova is inherit from Risc Zero but aim to replace STARK with Nova folding scheme☆28Updated last year
- LegoGroth16 implementation on top of Zexe☆23Updated 3 years ago
- Verify your NIPoPoWs efficiently, here☆10Updated 2 years ago
- Bellman backend for the r1cs crate☆12Updated 5 years ago
- ☆11Updated 4 years ago
- Pairing-friendly elliptic curve library☆24Updated 8 months ago
- Proof of concept snark prover for the minroot vdf.☆11Updated 3 years ago
- ☆18Updated 2 years ago
- Decentralised Voting Scheme☆15Updated 3 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Updated 3 years ago
- ☆9Updated 5 years ago