privacylab / talekLinks
a Private Publish Subscribe System
☆51Updated last year
Alternatives and similar repositories for talek
Users that are interested in talek are comparing it to the libraries listed below
Sorting:
- OPAQUE asymmetric PAKE, and its threshold implementation. Experimental, not audited.☆17Updated 4 years ago
- Infinitely presentable (aeon) rerandomisable (flux) anonymous credentials.☆29Updated 5 years ago
- privacy preserving primitives and protocols (p3) for routing and messaging in P2P networks☆95Updated 5 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆13Updated 8 years ago
- A BibTeX collection on Zero-Knowledge Proofs☆16Updated 7 years ago
- Public working documents (e.g., Internet drafts)☆23Updated 7 years ago
- in-dht onion routing using libp2p☆29Updated 5 years ago
- ☆25Updated 3 years ago
- notes, ideas and whatnot☆43Updated 4 years ago
- 🦀 Rust implementation of sinkhole private information retrieval☆16Updated 4 years ago
- a Tahoe-LAFS storage-system plugin which authorizes storage operations based on privacy-respecting tokens☆10Updated 6 months ago
- An EXPERIMENTAL implementation of the CPace PAKE, instantiated with the Ristretto255 group. In Rust☆17Updated 5 years ago
- Zcash "Sapling" cryptography☆87Updated 2 weeks ago
- An independent implementation of the Powers of Tau MPC ceremony.☆33Updated 7 years ago
- Challenge Bypass using the Ristretto group☆37Updated 2 weeks ago
- An implementation of publicly verifiable proofs of retrievability☆32Updated 7 years ago
- ☆12Updated 4 years ago
- Pastry DHT implementation with a standalone libp2p compatible node☆12Updated 5 years ago
- BLS working standard draft☆40Updated 6 years ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆44Updated 2 years ago
- A testlab built with Nomad and Consul to analyze the behavior of p2p networks at scale☆22Updated 6 years ago
- repository for tracking open tasks☆18Updated 7 years ago
- A proof-of-concept for stateless Bitcoin nodes.☆31Updated 6 years ago
- High Assurance Cryptographic Software☆10Updated 2 weeks ago
- 🔑 Command-line wrapper around RustySecrets, a Rust implementation of threshold Shamir's secret sharing.☆10Updated 7 years ago
- libp2p Collaborative Notebook for Research☆38Updated 7 months ago
- Tree-based KEM for group key management☆45Updated 7 years ago
- Implements ristretto255, a fast prime-order group.☆106Updated 4 months ago
- The secure messaging summit information☆20Updated 5 years ago
- Mix Network Bibliography☆15Updated 5 years ago