bifurcation / treekem
Tree-based KEM for group key management
☆43Updated 6 years ago
Alternatives and similar repositories for treekem:
Users that are interested in treekem are comparing it to the libraries listed below
- Challenge Bypass using the Ristretto group☆35Updated last week
- An implementation of a verifiable oblivious pseudorandom function (RFC 9497)☆61Updated 3 weeks ago
- Hashing to Elliptic Curves☆81Updated 5 months ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 4 years ago
- Bulletproofs and Bulletproofs+ Rust implementation for Aggregated Range Proofs over multiple elliptic curves☆73Updated 2 years ago
- BLS working standard draft☆39Updated 5 years ago
- Pure Rust implementation of HPKE (https://www.rfc-editor.org/rfc/rfc9180.html)☆33Updated 5 months ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆63Updated 2 years ago
- Coordination of implementation and interop specific details☆113Updated 8 months ago
- a Private Publish Subscribe System☆49Updated 9 months ago
- NuBLS is pure Rust implementation of BLS signatures with nifty threshold protocols☆19Updated 4 years ago
- Oblivious transfer library for rust☆11Updated 5 years ago
- Alternative zk-SNARK proof verifier written in Rust for Zcash Sprout.☆21Updated 7 years ago
- Proves knowledge of an ECDSA-P256 signature under one of many public keys that are stored in a list.☆206Updated 3 months ago
- Accumulators and Vector Commitments☆43Updated 2 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 5 years ago
- Zcash "Sapling" cryptography☆83Updated last week
- ☆60Updated last month
- A pure-Rust implementation of the Paillier encryption scheme☆82Updated 6 years ago
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆67Updated 3 years ago
- ☆32Updated 2 years ago
- Composable proof transcripts for public-coin arguments of knowledge☆126Updated last year
- ZKProofs website☆89Updated last year
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 3 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆16Updated 3 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 5 months ago
- Implementation of Messaging Layer Security☆117Updated 2 months ago
- Threshold BLS Signatures and DKG☆76Updated 9 months ago
- MPC implementation for a structured reference string (SRS) generation for SONIC proof system☆24Updated 6 years ago