bigspider / accumulatorLinks
Fast additive accumulators
☆14Updated 4 years ago
Alternatives and similar repositories for accumulator
Users that are interested in accumulator are comparing it to the libraries listed below
Sorting:
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Updated 6 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆31Updated 6 years ago
- One-Time Verifiably Encrypted Signatures A.K.A. Adaptor Signatures☆27Updated 5 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- Elliptic curve operations over secp256k1 *not for production*☆18Updated 3 years ago
- Implementation of bulletproofs++ in rust☆17Updated 2 years ago
- Efficient multi-asset confidential transactions☆34Updated 6 years ago
- ☆18Updated last year
- ☆15Updated 6 years ago
- An independent implementation of the Powers of Tau MPC ceremony.☆33Updated 7 years ago
- ☆17Updated 7 years ago
- Simple Schnorr Multi-Signatures☆30Updated last year
- ☆34Updated last year
- Website!☆22Updated 3 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 3 years ago
- ☆15Updated 5 years ago
- javascript code for one-round single bulletproof☆21Updated 6 years ago
- Elliptic Curve Implementation in Solidity☆25Updated last year
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆44Updated 2 years ago
- sha256(sha256(preimage)) in zk☆14Updated 4 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆16Updated 6 years ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆23Updated 6 years ago
- Zcash "Sapling" cryptography☆85Updated 2 months ago
- Multi-party computation for Zcash's "Sapling" zk-SNARK public parameters☆30Updated 2 years ago
- interBTC specification for a trust-minimized Bitcoin to Polkadot (and beyond) bridge☆17Updated 3 years ago
- ☆25Updated 2 years ago
- Coded Merkle Tree☆26Updated 6 years ago
- Presentations about R1CS☆18Updated 6 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆18Updated 4 years ago
- Taproot security proof☆22Updated 5 years ago