microsoft / crescent-credentialsLinks
Crescent adds privacy to existing credentials with zero-knowledge
☆41Updated 2 months ago
Alternatives and similar repositories for crescent-credentials
Users that are interested in crescent-credentials are comparing it to the libraries listed below
Sorting:
- A lattice-based non-interactive folding scheme written in Rust☆110Updated last week
- A prototype implementation of the zksaas protocol for distributed zkSNARK generation☆27Updated 2 years ago
- ☆63Updated 6 months ago
- ☆31Updated this week
- ☆51Updated 2 years ago
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆56Updated 3 months ago
- ☆70Updated 3 years ago
- Reference implementation in Python of Poseidon and optimized Poseidon (Neptune) hash functions☆87Updated 2 years ago
- Fiat-Shamir for the masses.☆82Updated last week
- ☆49Updated this week
- ☆80Updated 10 months ago
- Reef: A zkSNARK system for proving that a committed document matches a regex☆76Updated last week
- An implementation of the 'DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More' protocol.☆37Updated last week
- ☆47Updated 9 months ago
- A silent threshold encryption scheme, which does not require any interaction during the setup phase☆37Updated 5 months ago
- Testudo: Spartan + Groth16☆53Updated last year
- Verifiable FHE prototype☆27Updated last year
- A language for building boolean circuits based on TypeScript☆34Updated 4 months ago
- Spartan on Arkworks☆44Updated 3 months ago
- A cutting-edge zkWASM implementation leveraging Nova-NIVC-based folding techniques.☆43Updated last month
- Very fast and memory-efficient (but not succinct) ZK through VOLE in the Head. Contains adapter for load Circom-formatted circuits and wi…☆37Updated 5 months ago
- A web tool that helps you compare and visualize the performance of cryptographic operations☆92Updated 4 months ago
- ☆26Updated 9 months ago
- ☆52Updated last week
- Verifiable FHE with GKR☆27Updated last year
- ☆112Updated last year
- ZK proofs for image authenticity☆47Updated last month
- ☆27Updated last month
- ☆26Updated last year
- Groth16 over ICICLE☆38Updated 4 months ago