mmaker / anonymous-tokensView external linksLinks
Efficient Anonymous Tokens with Private Metadata Bit
☆15Mar 7, 2023Updated 2 years ago
Alternatives and similar repositories for anonymous-tokens
Users that are interested in anonymous-tokens are comparing it to the libraries listed below
Sorting:
- ☆12May 7, 2021Updated 4 years ago
- ABE GPSW scheme using BLS pairing implemented in Rust.☆16May 23, 2023Updated 2 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆28Mar 10, 2024Updated last year
- A C++ Implementation of Short Randomizable Signatures (PS Signatures) and EL PASSO (Privacy-preserving, Asynchronous Single Sign-On)☆26Jul 8, 2021Updated 4 years ago
- zkSNARK full flow example in Go☆12Jun 3, 2020Updated 5 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆15Nov 11, 2020Updated 5 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Jun 3, 2021Updated 4 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers☆14Jan 16, 2020Updated 6 years ago
- Proof of Device☆21Jan 20, 2023Updated 3 years ago
- ☆17Jul 11, 2025Updated 7 months ago
- Compact linkable ring signatures. A modification on MLSAG.☆20May 10, 2020Updated 5 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆31Oct 26, 2023Updated 2 years ago
- Faster Montgomery and Joye ladder formulas for short Weierstrass elliptic curves☆22Jul 1, 2020Updated 5 years ago
- A small and easy to use HPKE implementation in Go.☆20Dec 12, 2024Updated last year
- BLST-Verification☆23Jan 22, 2026Updated 3 weeks ago
- ☆19Jul 13, 2020Updated 5 years ago
- Implementation of the Hades permutation algorithm used in Poseidon Hashes with ZKProof capabilities.☆22Jan 24, 2024Updated 2 years ago
- Reference implementations of post-quantum cryptographic primitives☆33Aug 27, 2025Updated 5 months ago
- Software optimized implementations of GIFT and GIFT-COFB☆18Mar 29, 2022Updated 3 years ago
- ☆20Dec 24, 2019Updated 6 years ago
- Groth16 verifier on Arbitrum Stylus☆25Dec 10, 2023Updated 2 years ago
- Public working documents (e.g., Internet drafts)☆26Jun 8, 2018Updated 7 years ago
- Rust library for accumulation schemes☆25Jan 24, 2023Updated 3 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- ☆13Oct 6, 2020Updated 5 years ago
- DODO smart contract on EVM☆10Mar 5, 2023Updated 2 years ago
- C crypto library☆24Aug 2, 2023Updated 2 years ago
- LegoGroth16 implementation on top of Zexe☆25Dec 3, 2021Updated 4 years ago
- Uniswap Protocol using an Option Framework☆23Sep 7, 2021Updated 4 years ago
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Aug 24, 2020Updated 5 years ago
- Arkworks made simple for us: the non cryptographer software plumbers☆25Feb 8, 2023Updated 3 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Rust Implementation of Ethereum Binary Tree EIP-7864☆16Jul 13, 2025Updated 7 months ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- Simple trait that enables using FPGA VariableBaseMsm developed by ingonyama☆10Nov 23, 2022Updated 3 years ago
- Rust utilities for the ethereum attestation service.☆14Apr 6, 2024Updated last year
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- Schnorr signatures over big curves for Ledger devices. group arithmetic & key derivation for unusual elliptic curves.☆13Apr 9, 2020Updated 5 years ago