Crates.io | blake3-lamport-signatures |
lib.rs | blake3-lamport-signatures |
version | 0.3.5 |
source | src |
created_at | 2022-01-31 08:40:23.372423 |
updated_at | 2023-04-21 23:14:10.457502 |
description | Lamport Signatures using the Blake 3 Cryptographic Hash Function |
homepage | https://github.com/samuelSchlesinger/blake3-lamport-signatures |
repository | https://github.com/samuelSchlesinger/blake3-lamport-signatures |
max_upload_size | |
id | 524467 |
size | 29,198 |
Lamport, as well as Lamport-Merkle, signatures implemented using the blake3
cryptographic hash function. This is an incredibly inefficient digital
signature protocol and shouldn't be used under almost all circumstances, its
main benefit being its simplicity and flexibility.
Lamport keypairs should only be used to sign one message, while you can specify a number of messages to support in a Lamport-Merkle keypair.
use blake3_lamport_signatures::lamport;
let private_key = lamport::PrivateKey::generate()?;
let public_key = private_key.public_key();
let message = b"Yeah, I said it";
let signature = private_key.sign(message);
assert!(public_key.verify(message, &signature));
use blake3_lamport_signatures::merkle;
// generate a Merkle-Lamport private key capable of signing 100 messages
let mut private_key = merkle::PrivateKey::generate(100);
let public_key = private_key.public_key();
let message = b"And I'll say it again!";
let signature = private_key.sign(message);
assert!(public_key.verify(message, &signature);
There is a natural two-party verified communication protocol associated with
lamport signatures. Alice and Bob start with preshared PublicKey
s, and each
time they send a message, they include the PublicKey
for the next message.
Leslie Lamport is a really cool dude.