all InfoSec news
To Schnorr and beyond (part 2)
Malware Analysis, News and Indicators - Latest topics malware.news
This post continues a long, wonky discussion of Schnorr signature schemes and the Dilithium post-quantum signature. You may want to start with Part 1.
In the previous post I discussed the intuition behind Schnorr signatures, beginning with a high-level design rationale and ending with a concrete instantiation.
As a reminder: our discussion began with this Tweet by Chris Peikert:
Which we eventually developed into an abstract version of the Schnorr protocol that uses Chris’s “magic boxes” to realize part …
beyond concrete design high intuition may post-quantum quantum reminder signature signatures start