privacy-scaling-explorations / mpc-helloLinks
The hello-world of MPC.
☆12Updated 3 weeks ago
Alternatives and similar repositories for mpc-hello
Users that are interested in mpc-hello are comparing it to the libraries listed below
Sorting:
- Create MPC apps with TypeScript.☆48Updated 2 months ago
- Types of information in the world that are digitally signed, along with projects that use zk proofs over these signatures☆27Updated last year
- Trinity is a two-party computation (2PC) protocol designed to minimize interaction rounds, enable input verifiability, and facilitate reu…☆23Updated 2 months ago
- A language for building boolean circuits based on TypeScript☆34Updated last month
- JSON parser written in Lurk☆29Updated 2 years ago
- Create & verify zero-knowledge SNARK proofs in parallel, using noble cryptography☆52Updated last month
- ☆12Updated last year
- Production build of Gauss Labs' MP-PSI API using 2PC and FHE☆17Updated last year
- Finite Field Library in Javascript☆54Updated 2 months ago
- ☆29Updated 10 months ago
- proof of pdf☆27Updated 3 weeks ago
- A verifiable supercomputer☆73Updated 2 weeks ago
- Circuits for making ZK proofs about Baby Jub Jub ECDSA signatures☆21Updated 8 months ago
- A stateless Ethereum execution client☆31Updated 5 months ago
- 🔒 ZK-WASM: Zero-Knowledge Proofs in Rust 🦀, compiled to WebAssembly 🕸️, bridged with JavaScript 🚀☆28Updated 2 years ago
- Circom arithmetic circuits and concepts explained, in depth.☆28Updated last month
- 🚀 Interep back-end and front-end.☆35Updated 2 years ago
- Monorepo of tools for using the halo2 proving system in-browser using WASM.☆51Updated last year
- Use zk proofs of JWTs to authorize arbitrary transactions on chain. Soon to have scoped oauth'd session keys as well.☆20Updated 6 months ago
- A system for managing privacy-preserving groups.☆77Updated 3 months ago
- An anonymous social media platform.☆24Updated last year
- Public releases for the Valida toolchain☆24Updated 2 weeks ago
- Fast implementation of multi-scalar multiplication in WebAssembly☆34Updated 7 months ago
- Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.☆44Updated 8 months ago
- Integration of IBC with Starknet☆21Updated this week
- ☆23Updated last week
- Proving physical interactions with digital signatures☆33Updated 11 months ago
- Crescent adds privacy to existing credentials with zero-knowledge☆32Updated last week
- A battleship game using ZKPs☆43Updated last year
- ☆51Updated last year