nucypher / zerodb-afgh-preLinks
AFGH Proxy re-encryption for ZeroDB
☆21Updated 9 years ago
Alternatives and similar repositories for zerodb-afgh-pre
Users that are interested in zerodb-afgh-pre are comparing it to the libraries listed below
Sorting:
- Library for generating non-interactive zero knowledge proofs without trusted setup (Bulletproofs)☆182Updated 3 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆97Updated 3 years ago
- Robust MPC-based confidentiality layer for blockchains☆137Updated 4 years ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆78Updated 6 years ago
- ☆38Updated 7 years ago
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.☆66Updated 4 years ago
- NuCypher's reference implementation of Umbral (threshold proxy re-encryption) using OpenSSL and Cryptography.io☆296Updated 2 years ago
- Aggregate and Multi Signatures based on BGLS over BN256 and BLS12-381☆62Updated 3 years ago
- ☆51Updated 2 years ago
- ☆79Updated 8 years ago
- Personal fork of -zkp. Has some old mimblewimble stuff but mostly I just PR everything upstream now.☆85Updated last year
- A system for verifying outsourced computations, and applying SNARKs. Simplified release of the main Pepper codebase.☆126Updated 3 years ago
- Umbral implementation in Golang☆43Updated 7 years ago
- The Honey Badger of BFT Protocols☆143Updated 3 years ago
- A Java library for zk-SNARK circuits☆212Updated 2 years ago
- DEPRECATED☆22Updated 4 years ago
- The Pairing-based Crypto library☆259Updated 2 months ago
- A simple Python implementation of threshold BLS signatures.☆41Updated last year
- libsnark: a C++ library for zkSNARK proofs☆113Updated 2 years ago
- ☆136Updated 5 years ago
- A bilinear pairing library for petlib☆39Updated 2 years ago
- ZKPDL & cashlib: A language-based system for zero-knowledge proofs and electronic cash (e-cash).☆54Updated 9 years ago
- ☆27Updated 6 years ago
- Sage implementation of the isogeny-and-pairing based VDF☆24Updated 4 years ago
- Implementation of the CL signature scheme☆24Updated 8 years ago
- Sample implementation of NSEC5 cryptography☆23Updated 7 years ago
- Publicly Verifiable Secret Sharing, and more...☆27Updated last year
- Random Beacon Simulator☆122Updated 7 years ago
- Learning how to bulletproofs☆37Updated 6 years ago
- ☆44Updated 7 years ago