Picnic

A Family of Post-Quantum Secure Digital Signature Algorithms

The Picnic family of digital signature algorithms is designed to provide security against attacks by quantum computers, in addition to attacks by classical computers. The building blocks are a zero-knowledge proof system (with post-quantum security), and symmetric key primitives like hash functions and block ciphers, with well-understood post-quantum security. Picnic does not require number-theoretic, or structured hardness assumptions.

Publications

Libraries Implementing Picnic

Talks

Projects and Demos

Flexibility of the Picnic Design

Although not directly related to Picnic, other post-quantum secure (privacy enhancing) primitives use the same building blocks as Picnic. We believe that this work nicely demonstrates the flexibility of the basic Picnic design, which is why we list the respective papers below.

Picnic was designed by a group of cryptographers from Aarhus University, AIT Austrian Institute of Technology GmbH, DFINITY, Graz University of Technology, George Mason University, Georgia Tech, Microsoft Research, Northwestern University, Cornell Tech, and the Technical University of Denmark. The team includes Melissa Chase, David Derler, Steven Goldfeder, Daniel Kales, Jonathan Katz, Vladimir Kolesnikov, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Xiao Wang, and Greg Zaverucha.

                            

Funding Acknowledgments

In addition to support from the institutions listed above, this work has been supported in part by EU H2020 projects PRISMACLOUD (grant agreement number 644962) and PQCRYPTO (grant agreement number 645622), by the NSF Graduate Research Fellowship (grant number DGE 1148900), by COST Action IC1306, by the Danish Council for Independent Research, by A-SIT, and by iov42.