gijsvl / groth-sahai
An implementation of the Groth-Sahai NIZK protocol
☆14Updated 8 years ago
Alternatives and similar repositories for groth-sahai
Users that are interested in groth-sahai are comparing it to the libraries listed below
Sorting:
- ☆15Updated 6 years ago
- Linearly Homomorphic Time Lock Puzzle Library☆29Updated 5 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algori…☆13Updated 4 years ago
- Python implementation of the HydRand protocol☆18Updated 2 years ago
- Algorand's reference implementation of bls signature scheme☆14Updated 4 years ago
- ☆15Updated 4 years ago
- zkSNARKs for Bitcoin transaction inclusion proofs on Ethereum via ZoKrates☆11Updated 5 years ago
- C++ codebase for highly composable zkSNARKs with commit-and-prove capabilities.☆39Updated 4 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Updated 5 years ago
- Verify your NIPoPoWs efficiently, here☆10Updated 2 years ago
- distributed RSA modulus generation in Rust☆15Updated 3 years ago
- PVSS & Scrape in rust☆10Updated last year
- Zcash "Sapling" cryptography gadgets along with additions. Uses our Ethereum compatible bellman under the hood☆15Updated 4 years ago
- ☆8Updated 6 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆16Updated 5 years ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆15Updated 5 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Batch verifier for zkSNARKs☆10Updated 2 years ago
- pinocchio from Microsoft Research - this is rehosted on github only because Codeplex went down!☆18Updated 7 years ago
- Proof of concept snark prover for the minroot vdf.☆11Updated 3 years ago
- A Python simulator used to model cross shard transaction strategies for Ethereum 2.0☆11Updated last year
- ☆15Updated 3 years ago
- TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation☆14Updated 2 years ago
- Huff implementation of the BabyJubJub curve☆13Updated 5 years ago
- ☆10Updated 3 years ago
- ☆9Updated 5 years ago
- ☆11Updated 7 months ago
- ☆11Updated 2 years ago
- Generator and supporting evidence for security of the Tweedledum/Tweedledee pair of elliptic curves suitable for Halo☆20Updated 2 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆13Updated 7 years ago