dusk-network / phoenix
Privacy-preserving transaction model by Dusk
☆18Updated last month
Related projects ⓘ
Alternatives and complementary repositories for phoenix
- Implementation of the blindbid logic within Zero Knowledge Proofs☆21Updated 3 years ago
- Schnorr Signature algorithm usiing BLS12-381 Curve☆13Updated 10 months ago
- Implementation of the Hades permutation algorithm used in Poseidon Hashes with ZKProof capabilities.☆22Updated 10 months ago
- Container of general purpose gadgets used across Dusk Network's circuit implementations.☆13Updated 3 years ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆15Updated 4 years ago
- Prover for the Plumo light client system https://docs.zkproof.org/pages/standards/accepted-workshop3/proposal-plumo_celolightclient.pdf☆14Updated 2 years ago
- A pure rust implementation of Arcturus proofs for confidential transactions.☆12Updated 3 years ago
- Implementation of additive homomorphic ElGamal using the Ristretto group over Curve25519☆21Updated 2 years ago
- A standard library wrapper for use in the `arkworks` ecosystem☆37Updated 3 weeks ago
- 凩: A Next-Generation Composable Hybrid Smart Contract and (De)Centralized Merged Application Platform☆27Updated 9 months ago
- ☆16Updated 2 years ago
- ☆40Updated 4 months ago
- Ethereum Node Record (ENR) rust implementation☆14Updated 2 years ago
- Traits and utilities for working with finite fields☆17Updated 3 months ago
- Fully-compatible implementation of Privacy Pass in Rust.☆35Updated 4 years ago
- Lightweight CLI tools for Substrate nodes☆14Updated 3 years ago
- Reference implementation of Squirrel, an Efficient Synchronized Multi-Signatures from Lattices☆24Updated 11 months ago
- This library is archived; see crypto-primities for the latest version of this code☆22Updated last year
- Large Files Storage for Substrate☆21Updated 4 years ago
- RISC Zero Nova is inherit from Risc Zero but aim to replace STARK with Nova folding scheme☆29Updated last year
- ☆17Updated 9 months ago
- ☆20Updated 4 years ago
- ☆20Updated 2 years ago
- Identity Based Encryption schemes on the BLS12-381 pairing-friendly elliptic curve☆20Updated 3 years ago
- Bellman backend for the r1cs crate☆11Updated 5 years ago
- R1CS constraints for non-native field arithmetic☆20Updated 3 years ago
- ☆11Updated 4 years ago
- A library for decentralized private computation☆18Updated 3 years ago
- ☆18Updated 4 years ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆24Updated 5 years ago