etairi / A2LLinks
Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589
☆26Updated 3 years ago
Alternatives and similar repositories for A2L
Users that are interested in A2L are comparing it to the libraries listed below
Sorting:
- A proof-of-concept implementation to evaluate a UTXO-based generalized channel construction in Bitcoin.☆13Updated 4 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆30Updated 5 years ago
- ☆27Updated 7 years ago
- Rust implementation of multi-party Schnorr signatures over elliptic curves.☆172Updated 4 years ago
- A simple Python implementation of threshold BLS signatures.☆42Updated last year
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Updated last year
- C++ codebase for highly composable zkSNARKs with commit-and-prove capabilities.☆41Updated 5 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆97Updated 3 years ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆77Updated 6 years ago
- A libsnark's tutorial on sudoku☆17Updated 7 years ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 5 years ago
- Proof of concept for the A2L protocol on top of Bitcoin.☆18Updated 5 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆66Updated 2 years ago
- Robust MPC-based confidentiality layer for blockchains☆138Updated 4 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.☆65Updated 4 years ago
- Elliptic curve pairing in Python☆57Updated 5 years ago
- A library for generating non-interactive proofs of knowledge without trusted setup☆30Updated 6 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Multiprecision arithmetic & RSA accumulators, within SNARKs☆54Updated last year
- ☆38Updated 7 years ago
- Algorand's reference implementation of bls signature scheme☆49Updated 2 years ago
- Confidentiality-Preserving Smart Contract Platform☆22Updated 5 years ago
- The first go implementation of verifiable delay function (VDF)☆55Updated 6 years ago
- Publicly Verifiable Secret Sharing, and more...☆28Updated last month
- Aggregate and Multi Signatures based on BGLS over BN256 and BLS12-381☆62Updated 3 years ago
- 2P-ECDSA: Two-Party ECDSA MultiSignatures☆48Updated 6 years ago
- Library for generating non-interactive zero knowledge proofs without trusted setup (Bulletproofs)☆184Updated 3 years ago
- A collection of Paillier cryptosystem zero knowledge proofs☆120Updated 2 years ago
- Learning how to bulletproofs☆38Updated 7 years ago
- ☆43Updated 7 years ago