privacylab / talek
a Private Publish Subscribe System
☆50Updated 11 months ago
Alternatives and similar repositories for talek:
Users that are interested in talek are comparing it to the libraries listed below
- A core and experimental implementation of ClaimChain☆34Updated 6 years ago
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 3 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 7 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆28Updated 4 years ago
- An independent implementation of the Powers of Tau MPC ceremony.☆33Updated 7 years ago
- specification and design documents☆54Updated 2 years ago
- The anonymous credentials zoo☆16Updated 4 years ago
- katzenpost mix network encrypted messaging client library☆43Updated 2 years ago
- Public working documents (e.g., Internet drafts)☆23Updated 6 years ago
- Implements ristretto255, a fast prime-order group.☆98Updated 3 years ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Updated 4 years ago
- library for implementing the server side of the mix network: mixes and providers☆26Updated 2 years ago
- The secure messaging summit information☆20Updated 4 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆14Updated 4 years ago
- ♥ ♥ ♥ Trevor's & Moxie's Axolotl Ratchet + AGL's xmpp-client ♥ ♥ ♥☆12Updated 10 years ago
- Small, self-contained C implementation of Ristretto255 based on libdecaf☆13Updated 6 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆16Updated 4 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 4 months ago
- APRICOT: Advanced Protocols for Real-world Implementation of Computational Oblivious Transfers☆16Updated 8 years ago
- in-dht onion routing using libp2p☆29Updated 5 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- High Assurance Cryptographic Software☆10Updated 4 months ago
- Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups☆39Updated 7 months ago
- Go implementation of rendezvous protocol☆12Updated last year
- ☆18Updated last year
- A BibTeX collection on Zero-Knowledge Proofs☆16Updated 6 years ago
- CONIKS design documents☆16Updated 8 years ago
- An hash-chain with efficient O(1) append and O(logN) proof.☆14Updated 6 years ago
- Supporting evidence for security of the Jubjub curve to be used in Zcash☆16Updated 3 years ago
- VDAF specification☆23Updated 3 weeks ago