poanetwork / threshold_cryptoLinks
A pairing-based threshold cryptosystem for collaborative decryption and signatures used in HoneybadgerBFT implementation
☆199Updated last year
Alternatives and similar repositories for threshold_crypto
Users that are interested in threshold_crypto are comparing it to the libraries listed below
Sorting:
- Rust language general purpose elliptic curve cryptography.☆271Updated last year
- Schnorr VRFs and signatures on the Ristretto group☆330Updated 4 months ago
- Cryptographic accumulators in Rust.☆139Updated 8 months ago
- An implementation of Verifiable Delay Functions in Rust☆187Updated 4 years ago
- Pairing-friendly elliptic curve library.☆347Updated 7 months ago
- Experimental zero-knowledge proof compiler in Rust macros☆162Updated 2 years ago
- Bulletproofs and Bulletproofs+ Rust implementation for Aggregated Range Proofs over multiple elliptic curves☆76Updated 2 years ago
- Composable proof transcripts for public-coin arguments of knowledge☆131Updated 2 years ago
- Network layer for MPC (Secure Multi-Party Computation) based on Tendermint☆101Updated 4 years ago
- BLS Signatures in Rust☆80Updated 7 months ago
- Rust implementation of multi party Ed25519 signature scheme.☆148Updated last year
- A collection of Paillier cryptosystem zero knowledge proofs☆120Updated 2 years ago
- Pure Rust Implementation of secp256k1.☆184Updated 8 months ago
- ☆78Updated 5 years ago
- Rust library for BLS signatures, MuSig, PS signatures☆69Updated 3 years ago
- A pure-Rust implementation of the Paillier encryption scheme☆121Updated 11 months ago
- Arithmatic circuits convertible to R1CS based on Bulletproofs☆91Updated 2 years ago
- Rust-language assets for Zcash☆374Updated this week
- Rust implementation of multi-party Schnorr signatures over elliptic curves.☆172Updated 4 years ago
- ☆117Updated 4 years ago
- Threshold Signature Scheme for ECDSA☆202Updated 2 years ago
- Open source implementation of zkSTARKs in pure Rust☆83Updated last year
- A set of cryptographic primitives for building a multi-hop Proxy Re-encryption scheme, known as Transform Encryption.☆162Updated 2 weeks ago
- examples for bellman zk-snarks library☆77Updated 7 years ago
- Implementation of the Jubjub elliptic curve group☆122Updated last year
- An Rust implementation of FROST: Flexible Round-Optimised Schnorr Threshold signatures using the Ristretto group☆70Updated 3 years ago
- Zero-knowledge virtual machine written in Rust☆246Updated 2 years ago
- Cryptographic Accumulators in Rust☆66Updated 4 years ago
- A pure-Rust implementation of various threshold secret sharing schemes☆169Updated 7 years ago
- Rust library for efficient, succinct and modular set membership and non-membership proofs☆58Updated 4 years ago