Skip to main content

Questions tagged [signature]

Algorithms and protocols for creating signatures to documents, and verifying such signatures. These are normally asymmetric, for symmetric signatures see [mac].

Filter by
Sorted by
Tagged with
1 vote
1 answer
67 views

Is it secure to store only the aggregated BLS public key in a smart contract for signature verification?

I have a question regarding BLS signatures and aggregate signature verification in smart contracts. Let’s say I have 3 honest signers, each with their own private key. They all sign the same message, ...
sh3ifu's user avatar
  • 13
0 votes
0 answers
30 views

Is this hybrid encryption + signature scheme secure enough for storing small config files locally?

I'm working on a system where I need to securely store small local configuration files (like appsettings.json) that may contain secrets (API keys, tokens, etc.). ...
Jesús López's user avatar
1 vote
1 answer
64 views

Why is digital signature in ECDSA using (r, s) instead of (r, s_inverse)? [duplicate]

In ECDSA, there are two main components: the public key p and the private key d p = d * G ...
Muhammad Ikhwan Perwira's user avatar
3 votes
1 answer
83 views

Speed difference between SLH-DSA Fast and SLH-DSA Small

I was wondering if someone has experimental values concerning the speed difference between the two SLH-DSA versions "Fast" and "Small", in each security category. Thanks for your ...
Oslap's user avatar
  • 33
2 votes
0 answers
56 views

Can a valid Schnorr signature be used to create a signature for another key?

Given any number of signatures for the messages you choose, is it possible to construct a valid signature for another key that is somehow related to the first one? Let $P$ be the initial public key ...
pes oves's user avatar
  • 107
1 vote
1 answer
120 views

What are the other cases of nonce reuse in ECDSA?

We do know about the common case or vulnerability of the nonce reuse in two signatures of an address transaction which leads to calculation of $k$ and retrieval of the private key. Apart from that ...
Fřøşť's user avatar
0 votes
0 answers
39 views

Compatibility between Python/cryptography DSA signature verification and Openssl

Sorry if my question is not fully related to the mailing list. I'd like to show the interoperability between openssl 3.4.1 and ...
BrunooMaartin's user avatar
10 votes
1 answer
486 views

Signature schemes secure against re-signing

A signature scheme is secure against re-signing when knowledge of signature(s) of some unknown message under some honestly drawn key pair(s) with their public key(s) public does not allow ...
fgrieu's user avatar
  • 148k
1 vote
0 answers
31 views

deterministic threshold signatures

I would like to know if it is possible to make threshold signing of many transactions, but one for each address? i.e. - some application that generates a new address (public key) each time and then ...
pes oves's user avatar
  • 107
3 votes
1 answer
176 views

Multiplication in ML-DSA

I am trying to understand ML-DSA PQC and the cs1 multiplication done in ML-DSA-44 signature generation Printed value of s1 after unpacking and get the values(for s1....
gabbar's user avatar
  • 83
2 votes
0 answers
55 views

Verifying a signature without keys

My project requires me to develop a cryptographic system. I'm in need of some help since I'm a novice at this. I have a secret key and I want to create: $$ \sigma_a = sk_a(m)$$ Is there a function ...
Manuel Mares's user avatar
2 votes
1 answer
68 views

signature algorithm vs signature scheme?

what is the exact difference between a signature algorithm and a signature scheme? and what are the examples for them? it there any specific place to find difference between these cryptographic terms ...
kay.'s user avatar
  • 23
3 votes
0 answers
67 views

What are proper use cases for the context string in ML-DSA-87 (FIPS 204)?

The FIPS 204 document states that applications may choose a non-empty context string of up to 255 bytes and it seems near-fetched these may be used for distinguishing different types or use cases for ...
Socrates314's user avatar
4 votes
1 answer
527 views

Possible to modify ECDSA equations?

I'm completely new to elliptic curve math and modular arithmetic but I was chewing over the signing/verification equations for ECDSA: $$ \frac{H(m) + rd}{k} = s $$ $$ \frac{H(m)}{s} \cdot G + \frac{r}{...
Drazen Bjelovuk's user avatar
3 votes
2 answers
238 views

SIS on Dillithium

I was reading the Dillithium spec : https://pq-crystals.org/dilithium/data/dilithium-specification-round3-20210208.pdf#equation.6.13 And in the specification, they mention using LWE for key recovery ...
t3st12's user avatar
  • 85

15 30 50 per page
1
2 3 4 5
102