enzoh / go-bls
Boneh–Lynn–Shacham signature scheme.
☆36Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for go-bls
- Pairing-based cryptography for Go☆97Updated 5 years ago
- Example to create merkle path proof using libsnark☆45Updated 4 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆31Updated 9 months ago
- Playing around with HotStuff BFT consensus protocol.☆19Updated 4 years ago
- zkSNARK library implementation in Go from scratch (compiler, setup, prover, verifier)☆255Updated 3 years ago
- Aggregate and Multi Signatures based on BGLS over BN256 and BLS12-381☆60Updated 2 years ago
- Go implementation of the BIP Schnorr signature scheme.☆68Updated 3 years ago
- ☆79Updated 8 years ago
- ☆63Updated 6 years ago
- A high-level API for signing and verifying message digests using the BLS threshold signature scheme.☆113Updated 6 years ago
- Go implementation of the BLS12-381 pairing☆89Updated last year
- The Honey Badger of BFT Protocols☆136Updated 2 years ago
- The first go implementation of verifiable delay function (VDF)☆56Updated 5 years ago
- ☆173Updated last month
- A libsnark's tutorial on sudoku☆17Updated 6 years ago
- Implementation of MinBFT consensus protocol.☆63Updated last year
- High-speed BLS12-381 implementation in Go☆126Updated last year
- Crypto algorithms from scratch in Go. Learning purposes only. ECC, BN128 pairing, Paillier, RSA, Homomorphic computation, ElGamal, Schnor…☆74Updated 2 years ago
- ☆300Updated last week
- 💍implementation of linkable ring signatures in go☆53Updated 3 months ago
- Confidentiality-Preserving Smart Contract Platform☆21Updated 4 years ago
- A collection of Paillier cryptosystem zero knowledge proofs☆114Updated last year
- Proxy Re-Encryption go implementation☆80Updated 4 years ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆73Updated 5 years ago
- A simple Python implementation of threshold BLS signatures.☆39Updated 6 months ago
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆23Updated 2 years ago
- Rust implementation of multi-party Schnorr signatures over elliptic curves.☆170Updated 3 years ago
- basic code for verifiable random function and simple cryptographic sortition☆52Updated 3 years ago
- a VRF implementation following this ietf draft: https://tools.ietf.org/html/draft-goldbe-vrf-00☆21Updated 6 years ago
- ☆28Updated 2 years ago