A python library for ElGamal-based threshold decryption.
☆44Mar 14, 2024Updated 2 years ago
Alternatives and similar repositories for threshold-crypto
Users that are interested in threshold-crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TNO PET Lab - secure Multi-Party Computation (MPC) - Protocols - Distributed Keygen☆28Dec 10, 2024Updated last year
- (Towards) Scalable Threshold Crypto: BLS threshold signatures with millions of signers and a scalable Distributed Key Generation (and VSS…☆34Feb 7, 2024Updated 2 years ago
- Private set intersection using garbled bloom filters in semi-honest setting☆26Dec 11, 2015Updated 10 years ago
- Uniswap token swap via Layer 2 pessimistic rollup☆14Apr 28, 2021Updated 5 years ago
- ElGamal encryption and related zero-knowledge proofs☆17May 11, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Minimal Python environment set up using nix flakes.☆13May 23, 2025Updated 11 months ago
- Yao's Garbled Circuits (Java/AES)☆10Dec 9, 2013Updated 12 years ago
- Python implementation of Istanbul BFT algorithm using Flask. Experimental☆13Feb 15, 2022Updated 4 years ago
- An implementation of "The Simplest Oblivious Transfer Protocol"☆28Nov 13, 2018Updated 7 years ago
- ☆10Jun 28, 2013Updated 12 years ago
- A Framework for Machine Learning on Encrypted Data☆12Feb 10, 2022Updated 4 years ago
- A python implementation of distributed key generation over secp256k1☆13Nov 27, 2017Updated 8 years ago
- A minimal Typescript library for converting a json-rules-engine condition to a JsonLogic rule specification.☆11Jul 6, 2022Updated 3 years ago
- A Python implementation of the threshold variant of the Damgard-Jurik cryptosystem.☆15May 4, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- egg graphql plugin☆10Apr 12, 2022Updated 4 years ago
- A scheme that produces a zero-knowledge proof of correctness for an MPC computation. The scheme allows anyone, particularly someone exter…☆26Feb 20, 2024Updated 2 years ago
- Distributed Privacy Guard (DKGPG) implements Distributed Key Generation (DKG) and Threshold Cryptography for OpenPGP☆21Dec 18, 2022Updated 3 years ago
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Apr 28, 2025Updated last year
- NuBLS is pure Rust implementation of BLS signatures with nifty threshold protocols☆19Nov 10, 2020Updated 5 years ago
- "Personalised Short-Term Glucose Prediction via Recurrent Self-Attention Network" in CBMS 2021☆16Feb 16, 2022Updated 4 years ago
- Minimalistic implementation of a Verifiable (t, n) threshold signature scheme based on elliptic curve with python.☆30Mar 27, 2026Updated last month
- Computes SHA256 of arbitrary length inputs.☆15Nov 2, 2022Updated 3 years ago
- 🤖 In this work, we present our approach for the Author Profiling task of PAN 2019. The task is divided into two sub-problems, bot, and g…☆10Jul 6, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Develop here a programming language of reversible combinators☆16Nov 10, 2021Updated 4 years ago
- ☆23Nov 22, 2016Updated 9 years ago
- Official Implementation of "LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference"☆25Nov 12, 2023Updated 2 years ago
- Turn based fantasy campaign game for chainlink hackathon☆14Nov 28, 2021Updated 4 years ago
- smart contracts for an nft project of zombies and humans. If you're sent a zombie, all your humans turn to zombies.☆10Aug 21, 2021Updated 4 years ago
- Code for Findings of ACL 2021 "Differential Privacy for Text Analytics via Natural Text Sanitization"☆33Mar 15, 2022Updated 4 years ago
- A Microsoft-SEAL-compatible implementation of homomorphic encryption targeting Azure Sphere and other embedded devices.☆55Jan 24, 2022Updated 4 years ago
- Elliptic curve pairing in Python☆56Jul 31, 2020Updated 5 years ago
- A Vector Caching Scheme for Streaming FPGA SpMV Accelerators☆10Sep 7, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16Nov 17, 2021Updated 4 years ago
- Digital identity management frame based blockchain's smart contracts of zero knowledge proof☆11Oct 9, 2021Updated 4 years ago
- Monomi designer and planner prototype☆14Feb 16, 2015Updated 11 years ago
- Proving shortest paths with recursive SNARKs☆15Mar 9, 2023Updated 3 years ago
- NLP - Semantic Role Labeling using GCN, Bert and Biaffine Attention Layer. Developed in Pytorch☆13Sep 12, 2020Updated 5 years ago
- Zero-knowledge Range Proof☆16Nov 16, 2017Updated 8 years ago
- A set of tooling related to halo2 circuits verification inside Solidity contracts☆67Oct 1, 2024Updated last year