bifurcation / treekem
Tree-based KEM for group key management
☆44Updated 6 years ago
Alternatives and similar repositories for treekem:
Users that are interested in treekem are comparing it to the libraries listed below
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆63Updated last month
- BLS working standard draft☆39Updated 5 years ago
- This libary provides primitives for creating and verifying BLS threshold signatures.☆43Updated 2 years ago
- Coordination of implementation and interop specific details☆115Updated last week
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 5 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆33Updated 6 months ago
- a Private Publish Subscribe System☆49Updated 10 months ago
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆68Updated 3 years ago
- Accumulators and Vector Commitments☆43Updated 2 years ago
- Challenge Bypass using the Ristretto group☆35Updated this week
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆14Updated 2 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 3 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆15Updated 3 years ago
- Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees (Java Prototype)☆21Updated 3 years ago
- Oblivious transfer library for rust☆11Updated 5 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆26Updated last year
- MPC implementation for a structured reference string (SRS) generation for SONIC proof system☆24Updated 6 years ago
- Presentations about R1CS☆18Updated 5 years ago
- ☆32Updated 2 years ago
- ☆60Updated 3 weeks ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 5 years ago
- ☆23Updated last month
- Privacy-preserving messaging protocol for the web3☆45Updated 4 years ago
- Cryptographic Accumulators in Rust☆64Updated 3 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Threshold BLS Signatures and DKG☆76Updated 10 months ago
- Hierarchical derivations on Ed25519☆26Updated 3 years ago
- ☆64Updated 5 years ago