tastyproject / tastyLinks
Toolbox for Automatic Secure Two-partY computation
☆10Updated 9 years ago
Alternatives and similar repositories for tasty
Users that are interested in tasty are comparing it to the libraries listed below
Sorting:
- Malicious Two Party Computation Based on Garbled Circuits.☆12Updated 5 years ago
- Robust MPC-based confidentiality layer for blockchains☆137Updated 4 years ago
- Implementation of the ZKB++ proof system☆20Updated 6 years ago
- pinocchio from Microsoft Research - this is rehosted on github only because Codeplex went down!☆18Updated 8 years ago
- ☆137Updated 5 years ago
- ☆21Updated 3 years ago
- Rust implementation of the BMR16 arithmetic garbling scheme.☆34Updated 6 years ago
- A Platform for Robust Threshold Cryptography based on Asynchronous Publicly Verifiable Secret Sharing with Tunable Security☆97Updated 3 years ago
- Crypto and networking utils used for ABY and OTExtension☆19Updated 4 years ago
- C++ codebase for highly composable zkSNARKs with commit-and-prove capabilities.☆41Updated 5 years ago
- Global-Scale Secure Multiparty Computation☆50Updated 2 months ago
- ☆52Updated 2 years ago
- a C++ library for Pretty Good Confidential Transaction System☆17Updated 3 years ago
- Comprehensive Open Source Library for Secure Multiparty Computation☆188Updated 2 years ago
- Companion repository for blog post on benchmarking implementations of Paillier encryption☆19Updated 9 years ago
- Implements an RSA accumulator in Python☆14Updated 6 years ago
- A collection of Bristol format circuit files☆13Updated 3 years ago
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Updated 2 years ago
- Efficient and Interactive Zero-Knowledge Proofs☆103Updated 2 months ago
- Implementation of the Groth16 zk-SNARK proving system☆21Updated 7 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆68Updated 2 years ago
- Semi-honest Two Party Computation Based on Garbled Circuits.☆81Updated 2 months ago
- Hashing to Elliptic Curves☆80Updated last year
- Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation☆33Updated 2 months ago
- Elliptic curve pairing in Python☆57Updated 5 years ago
- A tiny, educational library for secure multi-party computation (in pure Python).☆97Updated 2 years ago
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve☆45Updated 5 years ago
- ☆22Updated 9 years ago
- Cryptographic accumulator based on the strong RSA assumption, Python & Solidity☆78Updated 7 years ago
- DEPRECATED☆22Updated 5 years ago