Achievements of the PRIViLEDGE project

The PRIViLEDGE project started three and half years ago with the aim to realise cryptographic protocols supporting privacy, anonymity, and efficient decentralised consensus for DLTs. Now the project is coming to an end and we are happy to confirm that we have achieved all of the set goals. 
We have developed 4 prototypes and 6 toolkits. The toolkits implement PRIViLEDGE’s results and help to assess their performances and practicality, and the prototypes integrate the toolkits in real-world systems and validate their usability. Last but not least, the project has been actively disseminating its results and in this blog post will give an overview of those results.


  1. Post-Quantum Secure Protocols toolkit provides access to hash-then-publish time-stamping and hash-based digital signatures. This toolkit was produced by Guardtime and is partially (time-stamping - KSI toolkit) available here: 
  2. Anonymous Authentication for Hyperledger Fabric allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities. This toolkit was produced by IBM and is available here:
  3. Mir-BFT: High-throughput Consensus for Hyperledger Fabric introduces an efficient consensus algorithm to Hyperledger Fabric to accommodate high-throughput applications. This toolkit was produced by IBM and is available here:
  4. Secure Multi-Party Computation on Ledgers allows libraries for two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections. This toolkit was produced by UNISA and TUE. The first module allowing two/multi-party computation libraries to use the ledger as a communication channel is available from The MPyC framework is available at verifiable MPC extension to MPyC is available from It requires the secure groups extension which is available here: 
  5. Zero-knowledge Proofs for Ledgers (aka SNARKY) is a Rust implementation of the Snarky Ceremonies protocol over the BLS12- 381 elliptic curve. It is the first experimental version of a production-grade library for running the protocol in real- life applications. This toolkit was produced by GRNet and UEDIN and is available here:
  6. Privacy-Preserving Data Storage on Ledgers is meant for data storage is a ledger-oriented solution for bridging data residing on a blockchain with those stored in an off-chain database. It is responsible for coordinating interaction between the backend ledger, storage, and the cryptographic library of an API service. This toolkit was produced by GRNet and is available here:


  1. Tiviledge: Verifiable Online Voting allows universal auditability with everlasting privacy on HyperLedger Fab-ric blockchain with applications to online voting. This prototype’s development was led by SCCEIV and not open-sourced.
  2. Prototype Application for Health Insurance for assessing feasibility of verifiable multi-party computation for privacy- preserving reports on detailed medical records. This research prototype’s development was led by Guardtime and not open-sourced. 
  3. University Ledger Diploma Record implements the DIPLOMATA protocol. This reseach prototype’s development was led by GRNet and is open sourced here:   
  4. Decentralized Software Updates for Stake-based Ledgers enables decentralized software updates in public stake-based blockchains in a way that is tolerant to chain splits and security attacks. This reseach prototype’s development was led by I.O. Research and is open-sourced here:   
Read more about the toolkits and prototypes from the dedicated deliverables D4.4. and D4.5, as well as D6.4.  


During the life-time of the project PRIViLEDGE produced 54 publications that covered a broad range of research areas: ranging from the practical, yet challenging ones – such as efficient consensus and secure decentralized software updates– to the more forward-looking, exemplified by post-quantum primitives and efficient protocols for zero-knowledge proofs and secure multi-party computation. In addition PRIViLEDGE held four project specific workshops, released 29 blog posts, and was active in networking and stakeholder engement on the field of crytography and DLT, and more specifically on use-case specific fields. The overview of PRIViLEDGE’s exploitation achievement in published in D5.5. and stakeholder activities can be found from deliverable D5.6

Overall, the PRIViLEDGE team worked very well on this challenging topic and the co-operation within the project between 9 partners was very good. As a results, our work has shown that developing cryptographic protocols to improve the privacy, anonymity, and efficient decentralised consensus aspects for DLTs is achievable. 

Written by Liis Livin (Guardtime)
Photo by Unsplash