cursive-team / babyjubjub-ecdsa
Circuits for making ZK proofs about Baby Jub Jub ECDSA signatures
☆20Updated 4 months ago
Alternatives and similar repositories for babyjubjub-ecdsa:
Users that are interested in babyjubjub-ecdsa are comparing it to the libraries listed below
- ☆2Updated last year
- Production build of Gauss Labs' MP-PSI API using 2PC and FHE☆17Updated 11 months ago
- Nova Verifier in Circom so it can be verified onChain☆58Updated last year
- ☆49Updated last year
- ☆26Updated last year
- Based on https://eprint.iacr.org/2022/1510☆24Updated 5 months ago
- In-browser ECDSA aggregation using Nova over secp/secq☆33Updated last year
- ☆33Updated last year
- The repository for high quality Trusted setups for groth16 based SNARKS☆22Updated 3 weeks ago
- zero knowledge proof aggregator for general circuit☆72Updated 10 months ago
- Verify a chain of x509 certificates in halo2☆31Updated last year
- Binius circuits web demos☆14Updated 3 months ago
- A Solidity implementation of Halo2's Pasta curves☆49Updated 2 years ago
- Some very rough benchmarks between sha256 circuits in different proving systems☆49Updated 2 years ago
- ☆21Updated last month
- Early prototype.☆23Updated 2 years ago
- Types of information in the world that are digitally signed, along with projects that use zk proofs over these signatures☆27Updated last year
- Benchmarking Polynomial Commitments☆49Updated last year
- Nova: Recursive SNARKs without trusted setup☆43Updated last year
- a hack implementation of CCS generic arithmetization, won a prize at Zuzalu hackathon 2023 despite incompleteness☆47Updated last year
- Verifiable FHE with GKR☆26Updated 5 months ago
- Solidity implementation of Nova proving system verifier☆60Updated last year
- polynomial commitments from linear codes☆40Updated 3 months ago
- Extractable Witness Encryption for KZG Commitments☆29Updated 4 months ago
- Proving shortest paths with recursive SNARKs☆12Updated 2 years ago
- Generate a zero-knowledge proof for a SHA1 pre-image.☆12Updated last year
- [WIP] Indistinguishability/Ideal Obfuscation (iO) Library based on https://eprint.iacr.org/2021/1334.pdf☆28Updated 5 months ago
- An example of how to build an end-to-end dApp with plonky2x☆22Updated last year
- ☆24Updated last year
- Noir library to verify JWT tokens, and prove claims.☆21Updated 3 weeks ago