A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.
☆50Feb 7, 2021Updated 5 years ago
Alternatives and similar repositories for fuzzy-encryption
Users that are interested in fuzzy-encryption are comparing it to the libraries listed below
Sorting:
- An SDK to help Relying Parties perform crypto operations relating to Verifiable Credentials.☆17Oct 11, 2021Updated 4 years ago
- Linked Data Signatures for JWS☆13Aug 5, 2022Updated 3 years ago
- Specification that codifies an inter-related pair of data formats for defining proof presentations (Presentation Definition) and subseque…☆88Jul 1, 2024Updated last year
- Python Implementation of the KERI Core Libraries☆28Apr 21, 2023Updated 2 years ago
- Universal Wallet 2020☆13Mar 6, 2023Updated 2 years ago
- An HTTP API for performing credential lifecycle management for Verifiable Credentials.☆131Feb 24, 2026Updated last week
- Key Event Receipt Infrastructure - the spec and implementation of the KERI protocol☆74Apr 21, 2023Updated 2 years ago
- ☆17Aug 14, 2021Updated 4 years ago
- Specification for a query language to request Verifiable Presentations from wallets etc.☆10Jan 13, 2026Updated last month
- Multi-language implementation of the Presentation Exchange protocol.☆10Nov 30, 2020Updated 5 years ago
- Decentralized Identifier Use Cases and Requirements v1.0☆56Feb 12, 2025Updated last year
- The Linked Data Security Vocabulary☆21Mar 5, 2023Updated 2 years ago
- ☆36Jul 15, 2023Updated 2 years ago
- A CBOR-encoding for Linked Data.☆18Updated this week
- RELEASED DRAFT: Decentralized Identifier Resolution (DID Resolution) 0.2 Specification☆21Updated this week
- REGISTRY: Linked Data Keys Registry (managed by W3C Credentials Community Group)☆12Feb 23, 2022Updated 4 years ago
- A mechanism for performing remote cryptographic key operations including key creation, signing, encryption, and decryption.☆11Apr 20, 2021Updated 4 years ago
- Decentralized Identifier Ecosystem Extensions☆132Feb 24, 2026Updated last week
- A Javascript CBOR-LD processor for web browsers and Node.js apps.☆25Sep 5, 2025Updated 5 months ago
- Specs and documentation for all DID-related /.well-known resources☆61Oct 31, 2025Updated 4 months ago
- Ed25519Signature2020 Linked Data Proof suite for use with jsonld-signatures.☆13Aug 22, 2024Updated last year
- Notes, ideas, and write-ups from DIF members and collaborators☆40Jul 15, 2022Updated 3 years ago
- JSON Web Message (JWM) RFC☆16Mar 7, 2024Updated last year
- A library for using BLS 12-381 key pairs☆16May 2, 2025Updated 10 months ago
- Proposed specification for the did method☆15Apr 13, 2021Updated 4 years ago
- DRAFT: did:web Decentralized Identifier Method Specification☆50Jul 31, 2024Updated last year
- A mechanism to use JSON Schemas with Verifiable Credentials☆29Apr 15, 2025Updated 10 months ago
- Format that normalizes the definition of requirements for the issuance of a credential☆31Oct 26, 2023Updated 2 years ago
- Formal specification of attestation mechanisms in Confidential Computing☆24Nov 22, 2025Updated 3 months ago
- Encrypted data vault implementation in Golang - https://identity.foundation/edv-spec/☆16Apr 4, 2023Updated 2 years ago
- ☆23May 29, 2020Updated 5 years ago
- A linked data proof suite for BBS+ signatures☆143Oct 2, 2024Updated last year
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- ☆35Mar 4, 2023Updated 3 years ago
- Credential Handler API polyfill☆39Dec 16, 2025Updated 2 months ago
- Universal Registrar implementation and drivers.☆85Jan 20, 2026Updated last month
- Aries Static Agent library for Python☆20Aug 13, 2024Updated last year
- WORK ITEM: Verifiable Credentials Examples☆35Jan 6, 2023Updated 3 years ago
- The BBS Signature Scheme☆99Updated this week