jdwhite48 / groth-sahai-rsLinks
A Rust library for the Groth-Sahai non-interactive witness-indistinguishable and zero-knowledge proof system
☆13Updated 3 months ago
Alternatives and similar repositories for groth-sahai-rs
Users that are interested in groth-sahai-rs are comparing it to the libraries listed below
Sorting:
- Testudo: Spartan + Groth16☆52Updated last year
- Let's go https://eprint.iacr.org/2022/1763.pdf☆61Updated 2 years ago
- A prototype implementation of the zksaas protocol for distributed zkSNARK generation☆27Updated last year
- ProtoGalaxy folding scheme PoC implementation https://eprint.iacr.org/2023/1106.pdf☆41Updated last year
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆53Updated 3 weeks ago
- ☆26Updated last year
- ☆27Updated 2 months ago
- ☆51Updated last year
- ☆23Updated 4 years ago
- polynomial commitments from linear codes☆46Updated 8 months ago
- A framework for SPDZ-style maliciously-secure MPC.☆54Updated 7 months ago
- Publicly Verifiable & Private Collaborative ML Model Training in Noir☆12Updated 6 months ago
- LegoGroth16 implementation on top of Zexe☆24Updated 3 years ago
- ☆43Updated 6 months ago
- ☆22Updated last year
- ☆41Updated last year
- ☆41Updated this week
- ☆26Updated 6 months ago
- RISC Zero Nova is inherit from Risc Zero but aim to replace STARK with Nova folding scheme☆28Updated 2 years ago
- ☆10Updated 3 years ago
- Polyexen demo of Plonkish Arithmetiation Format (Plaf) on the zkevm-circuits☆31Updated last year
- ☆24Updated last month
- Circom to Gnark Groth16 parser and recursion example☆18Updated last month
- zero knowledge proof aggregator for general circuit☆72Updated last year
- Verify JWTs using SNARK circuits☆28Updated last year
- a lattice lib for building snarks☆21Updated last year
- Extensive benchmarks of various zero-knowledge proof systems for Fully Homomorphic Encryption☆43Updated 3 months ago
- ☆58Updated 3 months ago
- ☆40Updated this week
- zkSNARKs as a service using secure multi-party computation.☆31Updated last year