bifurcation / treekemLinks
Tree-based KEM for group key management
☆45Updated 7 years ago
Alternatives and similar repositories for treekem
Users that are interested in treekem are comparing it to the libraries listed below
Sorting:
- Challenge Bypass using the Ristretto group☆36Updated last month
- Hybrid Public Key Encryption☆51Updated last year
- a Private Publish Subscribe System☆50Updated last year
- Proves knowledge of an ECDSA-P256 signature under one of many public keys that are stored in a list.☆214Updated last month
- BLS working standard draft☆39Updated 6 years ago
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆72Updated 5 months ago
- Hashing to Elliptic Curves☆80Updated last year
- [RFC9380] Hash to curves - Rust reference implementation☆28Updated last year
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆40Updated 2 weeks ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆44Updated 5 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- Composable proof transcripts for public-coin arguments of knowledge☆131Updated 2 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated last year
- C crypto library☆24Updated 2 years ago
- Curve ecGFp5☆68Updated 3 years ago
- Zcash "Sapling" cryptography☆85Updated last month
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 5 years ago
- Bulletproofs and Bulletproofs+ Rust implementation for Aggregated Range Proofs over multiple elliptic curves☆75Updated 2 years ago
- ☆116Updated 4 years ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Updated 6 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆65Updated 2 years ago
- An implementation of a post quantum anonymous credential scheme☆15Updated 9 months ago
- Javascript implementation of the Ristretto255 group operations, built on top of the popular TweetNaCl.js crypto library☆34Updated last year
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆70Updated 3 years ago
- Experimental zero-knowledge proof compiler in Rust macros☆161Updated last year
- This is only the beginning.☆18Updated this week
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆25Updated 4 years ago
- Implementation of the Jubjub elliptic curve group☆122Updated last year