lyronctk / treasure-houseView external linksLinks
Private treasuries enabled by ECDH and ZKPs
☆17Mar 31, 2023Updated 2 years ago
Alternatives and similar repositories for treasure-house
Users that are interested in treasure-house are comparing it to the libraries listed below
Sorting:
- Proactive refresh for accountable threshold signatures☆36Mar 21, 2023Updated 2 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- Plonky2 gadgets for EcGFp5 curve and base field arithmetic☆20Feb 19, 2023Updated 2 years ago
- Rust implementation for zcash/pasta☆84Apr 17, 2025Updated 9 months ago
- Vector Commitments with Constant-Sized, Updatable Proofs and Linear-Sized Public Parameters☆11Jun 3, 2021Updated 4 years ago
- JWT verification with zero knowledge proofs☆49Dec 2, 2023Updated 2 years ago
- Eddy255 elliptic curve parameters and implementation (embedding Ed25519)☆12Feb 18, 2023Updated 2 years ago
- A pure rust implementation of Arcturus proofs for confidential transactions.☆12Sep 28, 2025Updated 4 months ago
- ☆15May 27, 2021Updated 4 years ago
- Cryptographic protocols☆38Apr 19, 2023Updated 2 years ago
- A collection of technical notes from the Geometry research team.☆47Apr 17, 2023Updated 2 years ago
- An implementation of Sangria☆17Jun 1, 2023Updated 2 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Jan 16, 2020Updated 6 years ago
- Anemoi: a Family of ZK-friendly Arithmetization Oriented Hash Functions☆14Jul 9, 2023Updated 2 years ago
- Wycheproof for Rust☆20Sep 3, 2025Updated 5 months ago
- Your ultimate defender against private key theft.☆12Aug 27, 2022Updated 3 years ago
- Verifying a 512-layer CNN w/ Nova☆171May 5, 2023Updated 2 years ago
- An example of how to build an end-to-end dApp with plonky2x☆22Aug 30, 2023Updated 2 years ago
- A library for decentralized private computation☆19Jul 21, 2021Updated 4 years ago
- Nova Verifier in Circom so it can be verified onChain☆59Jun 9, 2023Updated 2 years ago
- Implementations of proof-carrying data☆37Jun 5, 2022Updated 3 years ago
- Rescue and Poseidon hash function implementations☆43Aug 15, 2024Updated last year
- Implementation of the blindbid logic within Zero Knowledge Proofs☆21Sep 15, 2021Updated 4 years ago
- An EVM low-level language that gives full control over the control flow of the smart contract.☆29Aug 15, 2025Updated 6 months ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- Early prototype.☆23Mar 30, 2023Updated 2 years ago
- FRI low-degree-testing & polynomial commitment scheme☆24Mar 26, 2023Updated 2 years ago
- Zcash-flavored Ed25519 for use in Zebra.☆35Jan 23, 2026Updated 3 weeks ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- Arkworks made simple for us: the non cryptographer software plumbers☆25Feb 8, 2023Updated 3 years ago
- Implementation of the Grumpkin curve in Rust.☆29Jul 5, 2023Updated 2 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Proof of concept implementation of Sigmabus https://eprint.iacr.org/2023/1406☆10Dec 20, 2023Updated 2 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- The technical paper for the Spark protocol☆11Mar 5, 2024Updated last year
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- Elliptic curve Go reference implementation☆26Feb 5, 2025Updated last year