tiktok-privacy-innovation / trustless-attestation-verificationLinks
☆58Updated 3 weeks ago
Alternatives and similar repositories for trustless-attestation-verification
Users that are interested in trustless-attestation-verification are comparing it to the libraries listed below
Sorting:
- ☆72Updated 2 months ago
- Oblivious key-value store based on Circuit ORAM☆33Updated 8 months ago
- Exploring the physical limits of trusted hardware in the classical and quantum settings to achieve security through physics.☆44Updated last year
- Proof-of-concept implementation of the papers on scalable collaborative zk-SNARKs (coZK) with applications to private proof delegation.☆56Updated 3 months ago
- A Risc-V CPU implemented as a zk-SNARK☆51Updated 3 years ago
- SMT 2023 Submission; license pending☆56Updated last year
- Benchmarks of popular zkVMs including Jolt☆63Updated last year
- Reef: A zkSNARK system for proving that a committed document matches a regex☆76Updated last week
- ☆31Updated 2 weeks ago
- Automated verification of uniqueness property for ZKP circuits☆90Updated last year
- Let's go https://eprint.iacr.org/2022/1763.pdf☆61Updated 2 years ago
- Accelerated Zero-knowledge Virtual Machine by Non-uniform Prover Based on GKR Protocol☆125Updated this week
- Automated verification of uniqueness property for ZKP circuits☆43Updated last year
- ☆13Updated 9 months ago
- zkSNARKs as a service using secure multi-party computation.☆30Updated last year
- Circom AES-GCM circuits☆33Updated 2 weeks ago
- FHE in the Risc0 zkVM☆25Updated 2 years ago
- AES-GCM implementation in Circom☆38Updated 3 years ago
- building blocks for accelerating ZK proofs over binary fields☆46Updated 5 months ago
- Diamond iO implementation https://eprint.iacr.org/2025/236☆85Updated 2 months ago
- A framework to run Fully Homomorphic Encryption computations (especially using the SEAL library) on Trusted Execution Environments, with …☆48Updated 2 years ago
- Groth16 over ICICLE☆38Updated 4 months ago
- Zk proving the correct execution of encryption operation under BFV Fully Homomorphic Encryption scheme☆114Updated last year
- ☆25Updated last year
- Frobenius sumcheck for vectorized boolean ops☆56Updated 7 months ago
- Awesome SGX and TEE on Blockchain Resources☆26Updated 2 years ago
- Critical vulnerabilities. Using zero to attack zero-knowledge proof (ZKP) PLONK C++ and ECDSA, $15000 award☆70Updated 2 years ago
- neural network inference standard for zero-knowledge-proof systems☆34Updated 2 years ago
- [WIP] Indistinguishability/Ideal Obfuscation (iO) Library based on https://eprint.iacr.org/2021/1334.pdf☆35Updated last year
- A framework for SPDZ-style maliciously-secure MPC.☆54Updated 10 months ago