google-deepmind / loopix-messaging
Anonymous messaging using mix networks
☆44Updated 5 years ago
Alternatives and similar repositories for loopix-messaging
Users that are interested in loopix-messaging are comparing it to the libraries listed below
Sorting:
- PriFi, a low-latency, local-area anonymous communication network.☆49Updated last year
- A decentralized privacy-preserving data sharing tool☆31Updated 3 years ago
- Bootstrapping Secure Communication without Leaking Metadata☆77Updated 5 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 4 years ago
- ☆18Updated last year
- a Private Publish Subscribe System☆50Updated last year
- The public repository of the Loopix mix system☆69Updated 7 years ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆38Updated 8 months ago
- Introduction to Secure Multi-Party Computations☆16Updated 6 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- Verifiable Random Function☆30Updated 4 years ago
- reading lists☆31Updated 6 years ago
- Mirror of all PDFs from the IACR's eprint☆46Updated last year
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- The secure messaging summit information☆20Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- Overlay Network for distributed protocols☆51Updated 2 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- Signature scheme submitted to NIST's Post-Quantum Cryptography Project☆28Updated 7 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- Secure distributed aggregation of high-dimensional vectors☆57Updated 8 years ago
- An implementation of Noise in Go☆42Updated 7 years ago
- ☆9Updated 2 years ago
- An experimental library for PDP and POR☆29Updated 4 years ago
- Reference implementations of post-quantum cryptographic primitives☆29Updated last year
- An implementation of the OPAQUE password-authenticated key exchange protocol☆10Updated 2 weeks ago
- notes, ideas and whatnot☆43Updated 3 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago