4 releases
0.1.3 | Apr 7, 2024 |
---|---|
0.1.2 | Apr 6, 2024 |
0.1.1 | Apr 5, 2024 |
0.1.0 | Apr 5, 2024 |
#2386 in Cryptography
127 downloads per month
10KB
144 lines
How LSIG Works
LSIG is a simple implementation of Lamport signatures designed for quantum-resistant digital signatures. Here's how it operates:
-
Private Key Generation:
- A private key is randomly generated
-
Public Key Derivation:
- The public key is derived by hashing the private key using a secure hash function.
- This ensures that the public key is securely derived from the private key, providing a one-way mapping.
-
Message Signing:
-
To sign a message, it is first hashed using a secure hash function (e.g., SHA-256).
-
The hash value is then used to reveal preimages based on the bit representation of the message.
-
These preimages serve as the signature blocks.
-
-
Signature Verification:
- To verify a signature, each block of the signature is hashed.
- The resulting hash values are compared against the corresponding blocks of the public key.
- If the hash values match, the signature is considered valid, confirming the authenticity of the message.
Limitations
- Key Reuse: Using the same key pair to sign multiple messages may lead to revealing a significant portion of the private key.
Dependencies
~1–1.7MB
~37K SLoC