All Projects → hashmatter → privacy-preserving-primitives

hashmatter / privacy-preserving-primitives

Licence: MIT License
primitives and protocols for implementing privacy preserving networks

Projects that are alternatives of or similar to privacy-preserving-primitives

Py Ipv8
Python implementation of the IPv8 layer
Stars: ✭ 157 (+1021.43%)
Mutual labels:  p2p, anonymity
Cause
An EDN-like CRDT (Causal Tree) for Clojure & ClojureScript that automatically tracks history and resolves conflicts.
Stars: ✭ 68 (+385.71%)
Mutual labels:  distributed-systems, p2p
Layr
A decentralized (p2p) file storage system built atop Kademlia DHT that enforces data integrity, privacy, and availability through sharding, proofs of retrievability, redundancy, and encryption, with smart-contract powered incentive scheme
Stars: ✭ 90 (+542.86%)
Mutual labels:  distributed-systems, p2p
Awesome Privacy On Blockchains
A curated list of privacy on blockchains resources
Stars: ✭ 86 (+514.29%)
Mutual labels:  p2p, anonymity
research
research, notes & ideas on various subjects
Stars: ✭ 54 (+285.71%)
Mutual labels:  distributed-systems, p2p
I2pd
🛡 I2P: End-to-End encrypted and anonymous Internet
Stars: ✭ 1,796 (+12728.57%)
Mutual labels:  p2p, anonymity
Nkn Client Js
[Deprecated, use nkn-sdk-js instead] JavaScript implementation of NKN client
Stars: ✭ 53 (+278.57%)
Mutual labels:  distributed-systems, p2p
Fpnd
Python package for freepn network daemon
Stars: ✭ 271 (+1835.71%)
Mutual labels:  p2p, anonymity
Testground
🧪 A platform for testing, benchmarking, and simulating distributed and p2p systems at scale.
Stars: ✭ 216 (+1442.86%)
Mutual labels:  distributed-systems, p2p
Diztl
Share, discover & download files in your network 💥
Stars: ✭ 162 (+1057.14%)
Mutual labels:  distributed-systems, p2p
Onionr
Private Decentralized Communication Network 🎭 🧅
Stars: ✭ 84 (+500%)
Mutual labels:  p2p, anonymity
rdoc
Conflict-free replicated JSON implementation in native Go
Stars: ✭ 76 (+442.86%)
Mutual labels:  distributed-systems, p2p
I2p.i2p
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties.
Stars: ✭ 1,186 (+8371.43%)
Mutual labels:  p2p, anonymity
Surge
Surge is a p2p filesharing app designed to utilize blockchain technologies to enable 100% anonymous file transfers. Surge is end-to-end encrypted, decentralized and open source.
Stars: ✭ 132 (+842.86%)
Mutual labels:  p2p, anonymity
Zeronet
ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network
Stars: ✭ 17,227 (+122950%)
Mutual labels:  p2p, anonymity
Nkn
Official Go implementation of NKN full node.
Stars: ✭ 287 (+1950%)
Mutual labels:  distributed-systems, p2p
Go2p
Simple to use but full configurable p2p framework
Stars: ✭ 80 (+471.43%)
Mutual labels:  distributed-systems, p2p
tordam
A library for peer discovery inside the Tor network
Stars: ✭ 13 (-7.14%)
Mutual labels:  p2p, anonymity
nkn-shell-daemon
NKN shell daemon
Stars: ✭ 29 (+107.14%)
Mutual labels:  distributed-systems, p2p
opengnb
GNB is open source de-centralized VPN to achieve layer3 network via p2p with the ultimate capability of NAT Traversal.GNB是一个开源的去中心化的具有极致内网穿透能力的通过P2P进行三层网络交换的VPN。
Stars: ✭ 440 (+3042.86%)
Mutual labels:  p2p

Privacy preserving primitives

This repo lists implementations, design and papers of primitives and protocols aiming at increasing privacy of networked systems. The goal of this project is to create the go-to directory for developers and system designers to learn about the existing tools for developing applications which are privacy preserving.

Index

A. Data structures

B. Secure messaging

A. Data structures

ClaimChain

ClaimChain is a cryptographic primitive providing a privacy-preserving, authenticated and decentralized data store of claims. The paper shows how to use ClaimChain as a privacy-preserving decentralized public key distribution.

when to use it: In P2P or centralized systems in which clients and/or servers need to edit and share verifiable and authenticated data structures with fine-grained access control. This primitive does not require a central point of authority to provide its properties, although it does not provide consensus out of the box (i.e. there is no mechanism to ensure all users have the same version of the ClaimChain at the same point).

B. Secure messaging

Sphinx

Sphinx is a compact cryptographic packet format that can be used in onion routing, mix networks and as a general purpose secure transport between senders and intermediate relays in P2P networks. Sphinx uses Diffie Hellman to derive the shared keys between the sender of the message and the relayers. Designers and developers can chose the family of cryptographic primitives to use, depending on the cases.

when to use it: In network applications in which relay nodes should not learn anything about the source, destination and content of the message to relay, besides the information needed to forward the message to the next hop.

HORNET

HORNET is a high-speed anonymous communication protocol designed to be deployed at a network level by Future Internet Architectures by default. The message relays do not keep state of anonymous communications. Instead, the state of the anonymous channel is included in the message itself.

when to use it: On top of P2P overlay networks (e.g. DHTs) to provide protection against packet/message correlation, session linkage, metadata leaks and to protect against passive network adversaries. Any P2P messaging application which uses multiple message relays can use HORNET to provide metadata protection against passive and global adversaries.


Community

Join our community of developers and researchers working on privacy preserving networks and applications at the gitter channel.

Contributing

Check the issues for ideas on how to help the project. When adding a new project to the list, use the same item structure. Fork and PR for adding or improve content.

License

© MIT hashmatter (https://hashmatter.com)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].