mmeruje / EC-SchnorrLinks
A python implementation of the Schnorr Zero-Knowledge Protocol over Elliptic Curves.
☆13Updated 8 years ago
Alternatives and similar repositories for EC-Schnorr
Users that are interested in EC-Schnorr are comparing it to the libraries listed below
Sorting:
- Minimalistic implementation of a linkable spontaneously anonymous group (LSAG) signature scheme with python over elliptic curves.☆30Updated 5 years ago
- A simple Python implementation of threshold BLS signatures.☆42Updated last year
- BLS signatures in C++, using the blst library for BLS12-381☆307Updated 6 months ago
- Rust implementation of multi-party Schnorr signatures over elliptic curves.☆173Updated 4 years ago
- ☆317Updated 4 months ago
- ☆62Updated 7 years ago
- ☆79Updated 9 years ago
- Library for generating non-interactive zero knowledge proofs without trusted setup (Bulletproofs)☆184Updated 3 years ago
- A high-level API for signing and verifying message digests using the BLS threshold signature scheme.☆115Updated 7 years ago
- BlockDAG algorithms simulation.☆72Updated 7 years ago
- ☆24Updated 8 years ago
- Omniledger implementation☆36Updated 7 years ago
- Bitcoin and Blockchain Simulator☆196Updated 7 years ago
- Java Boneh, Lynn, and Shacham (BLS) Signature Aggregation. Implementation of "Aggregate and Verifiably Encrypted Signatures from Bilinear…☆27Updated 7 years ago
- ☆25Updated 7 years ago
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆298Updated 3 years ago
- Learning how to bulletproofs☆38Updated 7 years ago
- Zero Knowledge Proofs and how they can be implemented in Quorum☆138Updated last year
- Core library for Obyte https://obyte.org☆148Updated 2 weeks ago
- BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs☆41Updated 5 years ago
- Pairing-based cryptography for Go☆102Updated 7 years ago
- ☆38Updated 7 years ago
- consensus protocol: dpos - practical bft☆25Updated 7 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.☆65Updated 5 years ago
- ☆15Updated 6 years ago
- Implementation of the Practical Byzantine Fault Tolerant Algorithm (pbft)☆136Updated 4 years ago
- A containarized Enigma Protocol environment to start writing secret contracts☆50Updated 6 years ago
- Demo for how algorithms dpos with pbft works☆189Updated 9 years ago
- Implementation of MinBFT consensus protocol.☆63Updated 2 years ago
- BigchainDB Enhancement Proposals☆33Updated 5 years ago