mmou / threshold-OPAQUE
OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.
☆16Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for threshold-OPAQUE
- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/☆23Updated 4 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Updated 4 years ago
- Efficient Anonymous Tokens with Private Metadata Bit☆13Updated last year
- High Assurance Cryptographic Software☆10Updated 8 months ago
- ☆18Updated last year
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papers☆14Updated 4 years ago
- [RFC9380] Hash to curves - Rust reference implementation☆24Updated 8 months ago
- BLST-Verification☆20Updated 2 years ago
- Oblivious transfer library for rust☆11Updated 4 years ago
- Challenge Bypass using the Ristretto group☆35Updated this week
- Multi-party computation utilities toolkit for rust☆16Updated 4 years ago
- SQISign: Short Quaternion and Isogeny Signature – C implementation based on PARI/GP (obsolete implementation)☆27Updated last year
- 🦀 Rust implementation of sinkhole private information retrieval☆15Updated 3 years ago
- [work in progress] Python framework for supporting cryptographic game-hopping proofs☆13Updated 2 years ago
- ☆12Updated 3 years ago
- The secure messaging summit information☆20Updated 4 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- Couple of "nice" curves at 128-bit and 224-bit security levels☆11Updated 3 years ago
- BLS working standard draft☆39Updated 5 years ago
- a CCA-secure module-lattice-based KEM☆15Updated 5 years ago
- Implementation of cryptographic primitives in Go☆12Updated last year
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 5 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- An implementation of a post quantum anonymous credential scheme☆11Updated last year
- ☆15Updated 5 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆43Updated 4 years ago
- Around applying the VDF construcrtion based on isogenies between super-signular elliptic curves☆15Updated 3 years ago
- Repo for the implementation of the isogeny based signature scheme CSI-FiSh☆23Updated last year
- specification and design documents☆53Updated last year