hashmatter / privacy-preserving-primitivesLinks
primitives and protocols for implementing privacy preserving networks
☆16Updated 6 years ago
Alternatives and similar repositories for privacy-preserving-primitives
Users that are interested in privacy-preserving-primitives are comparing it to the libraries listed below
Sorting:
- A curated collection of links for secure messaging.☆34Updated 5 years ago
- PeekABook, a private order matching system. https://ethresear.ch/t/peekabook-private-order-matching/6987☆18Updated 2 years ago
- Proof of Device☆20Updated 2 years ago
- in-dht onion routing using libp2p☆29Updated 5 years ago
- Pastry DHT implementation with a standalone libp2p compatible node☆12Updated 5 years ago
- A blockstore for ipfs that replaces pinning with counting and tagging☆13Updated 4 years ago
- Fully-compatible implementation of Privacy Pass in Rust.☆35Updated 5 years ago
- A library for peer discovery inside the Tor network☆28Updated last year
- Vanity public key generator for use with IPFS and IPNS☆40Updated 3 years ago
- A rust implementation of Alexey Akhunov's multiproof algorithm☆34Updated 5 years ago
- A library for decentralized private computation☆19Updated 4 years ago
- A zkSNARK implementation of a merkle tree membership preimage proof.☆23Updated 6 years ago
- Blind signatures over secp256k1 elliptic curve☆18Updated 3 years ago
- Rust implementation of Zcash multi-signautres☆14Updated 6 years ago
- Distributed PKI based DNS☆28Updated 5 years ago
- supplement material for BlackHat2020 talk: Multiple Bugs in Multi-Party Computation: Breaking Cryptocurrency's Strongest Wallets☆12Updated 5 years ago
- ☆18Updated last year
- ☆15Updated 4 years ago
- Codex durability engine research☆35Updated this week
- privacy preserving primitives and protocols (p3) for routing and messaging in P2P networks☆97Updated 5 years ago
- Specification work regarding multihash, multiaddr, and others☆27Updated 4 months ago
- A standard point from which crypto projects may derive their responsible disclosure policy.☆17Updated 3 years ago
- Collection of radicle binaries.☆20Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Reference specification for Aragon Chain☆18Updated 5 years ago
- U2f implementation with threshold signatures☆16Updated 4 years ago
- Research and specification for Big Brother protocol☆14Updated 6 years ago
- The world's first sybil resistant, fully decentralized reputation protocol.☆26Updated 6 years ago
- A contract that allows you to create private keys on-chain and sign data with secp256k1 signatures☆25Updated 4 years ago
- notes, ideas and whatnot☆43Updated 3 years ago