decentralized-identity / crypto-wgLinks
Meeting notes, transcripts previous agendas and active working group items
☆16Updated 8 months ago
Alternatives and similar repositories for crypto-wg
Users that are interested in crypto-wg are comparing it to the libraries listed below
Sorting:
- Typescript abstractions over Rust crypto library's WASM wrapper☆31Updated 4 months ago
- Cryptographic Accumulators in Rust☆66Updated 3 years ago
- The BBS Signature Scheme☆89Updated 3 weeks ago
- Anonymous Credential Exchange 2.0☆45Updated this week
- BLS signature implementation on the BLS12-381 curve that meets the IETF spec.☆16Updated 8 months ago
- Simple Schnorr Multi-Signatures☆32Updated last year
- An implementation of BBS+ signatures using rust and typescript for node.js☆62Updated 5 months ago
- Threshold ECDSA via Triples☆80Updated last year
- An SDK to help Relying Parties perform crypto operations relating to Verifiable Credentials.☆17Updated 3 years ago
- Rust library for efficient, succinct and modular set membership and non-membership proofs☆58Updated 4 years ago
- Accumulators and Vector Commitments☆43Updated 2 years ago
- ☆25Updated 4 years ago
- ☆40Updated 3 months ago
- A library for using BLS 12-381 key pairs☆16Updated 3 months ago
- Elliptic curve accumulator☆19Updated last year
- Threshold BLS Signatures and DKG☆76Updated last month
- ☆16Updated last year
- ☆33Updated 9 months ago
- ☆23Updated 4 years ago
- A linked data proof suite for BBS+ signatures☆142Updated 10 months ago
- Ethereum-based Distributed Key Generation Protocol☆55Updated 3 years ago
- An implementation of BBS+ signatures for node and browser environments☆121Updated 5 months ago
- zkSNARKs as a service using secure multi-party computation.☆31Updated last year
- Rust crypto library for data privacy tools☆113Updated this week
- We would like to open up the design process for did:pkh to a more open and consultative/deliberative conversation in the open.☆47Updated 2 years ago
- An implementation of the Paillier cryptosystem using native JS implementation of BigInt☆47Updated 2 years ago
- Network layer for MPC (Secure Multi-Party Computation) based on Tendermint☆102Updated 4 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆30Updated 5 years ago
- Key Event Receipt Infrastructure - the spec and implementation of the KERI protocol☆75Updated 2 years ago
- ☆13Updated 2 years ago