microsoft / crescent-credentialsLinks
Crescent adds privacy to existing credentials with zero-knowledge
☆32Updated 2 weeks ago
Alternatives and similar repositories for crescent-credentials
Users that are interested in crescent-credentials are comparing it to the libraries listed below
Sorting:
- A language for building boolean circuits based on TypeScript☆34Updated last week
- ☆41Updated 4 months ago
- An implementation of the 'DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More' protocol.☆31Updated last month
- ☆51Updated last year
- Reef: A zkSNARK system for proving that a committed document matches a regex☆74Updated last year
- ☆76Updated 6 months ago
- ☆53Updated 2 months ago
- ☆26Updated 4 months ago
- A lattice-based non-interactive folding scheme written in Rust☆82Updated last week
- A prototype implementation of the zksaas protocol for distributed zkSNARK generation☆27Updated last year
- zkSNARKs as a service using secure multi-party computation.☆31Updated last year
- Fiat-Shamir for the masses.☆68Updated 3 weeks ago
- ☆67Updated 2 years ago
- Types of information in the world that are digitally signed, along with projects that use zk proofs over these signatures☆27Updated last year
- Create MPC apps with TypeScript.☆48Updated 2 months ago
- ☆25Updated last year
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆49Updated last week
- ZK proofs for image authenticity☆44Updated 2 weeks ago
- Verifiable FHE prototype☆24Updated 11 months ago
- ☆27Updated last month
- Very fast and memory-efficient (but not succinct) ZK through VOLE in the Head. Contains adapter for load Circom-formatted circuits and wi…☆30Updated last month
- Zk proving the correct execution of encryption operation under BFV Fully Homomorphic Encryption scheme☆113Updated last year
- Rust crypto library for data privacy tools☆111Updated 3 weeks ago
- A silent threshold encryption scheme, which does not require any interaction during the setup phase.☆34Updated 3 weeks ago
- A cutting-edge zkWASM implementation leveraging Nova-NIVC-based folding techniques.☆37Updated this week
- Publicly Verifiable & Private Collaborative ML Model Training in Noir☆12Updated 4 months ago
- Benchmarks of popular zkVMs including Jolt☆60Updated last year
- Circuits for making ZK proofs about Baby Jub Jub ECDSA signatures☆21Updated 8 months ago
- Reference implementation in Python of Poseidon and optimized Poseidon (Neptune) hash functions☆81Updated last year
- Extensive benchmarks of various zero-knowledge proof systems for Fully Homomorphic Encryption☆42Updated 2 months ago