Threshold Signature Scheme for ECDSA
☆202Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for threshold-signatures
Users that are interested in threshold-signatures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust implementation of {t,n}-threshold ECDSA (elliptic curve digital signature algorithm).☆1,077Sep 14, 2023Updated 2 years ago
- A curated list of distributed key generation and threshold signatures implementations☆324Apr 3, 2023Updated 2 years ago
- A threshold cryptography library in Rust☆115Jun 23, 2025Updated 9 months ago
- Threshold BLS signatures in Rust☆77Nov 17, 2021Updated 4 years ago
- FS-DKR: One Round Distributed Key Rotation☆34Oct 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Threshold Signature Scheme, for ECDSA and EDDSA☆1,002Oct 24, 2025Updated 5 months ago
- An example usage as a standalone CLI of https://github.com/KZen-networks/multi-party-ecdsa library which is a Rust implementation of {t,n…☆37Feb 18, 2026Updated last month
- ☆15May 27, 2021Updated 4 years ago
- Implementation of protocols for threshold signatures☆372Sep 10, 2025Updated 6 months ago
- An ECDSA threshold signature algorithm implemented in Rust.☆145Sep 26, 2024Updated last year
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆72Nov 30, 2021Updated 4 years ago
- Network layer for MPC (Secure Multi-Party Computation) based on Tendermint☆99Jan 19, 2021Updated 5 years ago
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Implementation of the FROST protocol for threshold Ed25519 signing☆75Feb 19, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆21Sep 6, 2020Updated 5 years ago
- Threshold BLS Signatures and DKG☆81Mar 2, 2026Updated 3 weeks ago
- A pure-Rust implementation of the Paillier encryption scheme☆37Dec 26, 2022Updated 3 years ago
- Secure transport for running MPC protocols backed by Signal☆69Apr 5, 2021Updated 4 years ago
- Rust implementation of multi party Ed25519 signature scheme.☆148May 6, 2024Updated last year
- Javascript threshold signatures SDK☆111Jan 7, 2023Updated 3 years ago
- ☆21May 19, 2023Updated 2 years ago
- Protecting cryptographic signing keys and seed secrets with Multi-Party Computation.☆482Jul 28, 2022Updated 3 years ago
- Wallet for Binance chain powered by two-party ECDSA☆51Sep 16, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- An implementation of a threshold ECDSA signature scheme☆17Feb 11, 2025Updated last year
- The project is open-sourced and funded by Binance Lab.☆107Dec 11, 2019Updated 6 years ago
- Simple RSA VDF in Rust☆21Apr 13, 2021Updated 4 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- Hierarchical Threshold Signature Scheme☆405Mar 6, 2026Updated 3 weeks ago
- a sketch of what a zkvm could look like☆26Apr 19, 2021Updated 4 years ago
- Version 2 of ZKaggle, 🏆 Finalist of ETHGlobal FVM Space Warp Hack☆16Jul 12, 2023Updated 2 years ago
- ☆10Jan 7, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆28Dec 8, 2021Updated 4 years ago
- A Cairo VM prover implemented using Winterfell☆17May 4, 2023Updated 2 years ago
- efficient modular multiplication research☆15Feb 8, 2023Updated 3 years ago
- Aggregatable Distributed Key Generation☆49Apr 6, 2022Updated 3 years ago
- Minimalistic implementation of a Verifiable (t, n) threshold signature scheme based on elliptic curve with python.☆30Jan 3, 2020Updated 6 years ago
- Starknet sequencer built with Tendermint Core☆52Apr 3, 2023Updated 2 years ago
- The crypto library used by CodeChain.☆13Aug 12, 2020Updated 5 years ago