BLISS (short for Bimodal Lattice Signature Scheme) is a digital signature scheme proposed by Léo Ducas, Alain Durmus, Tancrède Lepoint and Vadim Lyubashevsky in their 2013 paper "Lattice Signature and Bimodal Gaussians".
In cryptography, a digital signature ensures that a message is authentically from a specific person who has the private key to create such a signature, and can be verified using the corresponding public key. Current signature schemes rely either on integer factorization, discrete logarithm or elliptic curve discrete logarithm problem, all of which can be effectively attacked by a quantum computer. BLISS on the other hand, is a post-quantum algorithm, and is meant to resist quantum computer attacks.
Compared to other post-quantum schemes, BLISS claims to offer better computational efficiency, smaller signature size, and higher security. A presentation once anticipated that BLISS would become a potential candidate for standardization, however it was not submitted to NIST. NIST's criteria for selecting schemes to standardize includes side-channel resistance. However, BLISS and derivative schemes like GALACTICS have shown vulnerabilities to a number of side-channel and timing attacks.
[1][2][3][4]
^Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, and Yuval Yarom. [Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme.] Cryptographic Hardware and Embedded Systems - 18th International Conference (2016): 323-345
^Tibouchi, Mehdi and Alexandre Wallet. [One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips.] Journal of Mathematical Cryptology 15(1) (2020): 131-142
^Thomas Espitau, Pierre-Alain Fouque, Benoit Gerard, and Mehdi Tibouchi. [Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers.] Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017): 1857–1874
^Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, and
Jean-Pierre Seifert. [Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.] Proceedings of the 17th International Conference on Availability, Reliability and Security (2022) 34: 1–11
and 25 Related for: BLISS signature scheme information
BLISS (short for Bimodal Lattice SignatureScheme) is a digital signaturescheme proposed by Léo Ducas, Alain Durmus, Tancrède Lepoint and Vadim Lyubashevsky...
A BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signaturescheme which allows a user to verify that a signer is authentic...
signaturescheme is a digital signaturescheme based on Merkle trees (also called hash trees) and one-time signatures such as the Lamport signature scheme...
The ElGamal signaturescheme is a digital signaturescheme which is based on the difficulty of computing discrete logarithms. It was described by Taher...
Schnorr signature is a digital signature produced by the Schnorr signature algorithm that was described by Claus Schnorr. It is a digital signaturescheme known...
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a message gives...
The primary example of this approach is a signature known as the Bimodal Lattice SignatureScheme (BLISS). It was developed by Ducas, Durmas, Lepoint...
and ElGamal signatureschemes.: 486 The National Institute of Standards and Technology (NIST) proposed DSA for use in their Digital Signature Standard (DSS)...
post-quantum digital signatureschemeBliss, Kentucky Bliss, Idaho Bliss, Missouri Bliss, New York Bliss, Oklahoma Bliss Corner, Massachusetts Bliss Township, Michigan...
cryptography, a Lamport signature or Lamport one-time signaturescheme is a method for constructing a digital signature. Lamport signatures can be built from...
cryptography, the Elliptic Curve Digital Signature Algorithm (ECDSA) offers a variant of the Digital Signature Algorithm (DSA) which uses elliptic-curve...
PGP, and other cryptosystems. The Digital Signature Algorithm (DSA) is a variant of the ElGamal signaturescheme, which should not be confused with ElGamal...
encryption of McEliece. Niederreiter can be used to construct a digital signaturescheme. A special case of Niederreiter's original proposal was broken but...
along with the scheme, leading Rouse to record the conversations. Rouse later sued his attorney for releasing the tapes to investigators. Bliss later called...
lattice-based compact signaturescheme such as Falcon (GPV-style Hash-and-Sign paradigm) and BLISS (GLP-style Fiat–Shamir paradigm) to prevent signature from leaking...
the intractability hypothesis upon which this cryptosystem is based. The scheme is an additive homomorphic cryptosystem; this means that, given only the...
Shor's algorithm). To face this new problem, new quantum digital signatureschemes are in development to provide protection against tampering, even from...
known as the NTRU Signature Algorithm, is an NTRU public-key cryptography digital signature algorithm based on the GGH signaturescheme. The original version...
concoction, thus creating Bliss. Mojo Jojo also considered himself Bliss' childhood friend when he was the Professor's lab assistant. Bliss possesses superhuman...
secret key—methods; Mobile signatures are electronic signatures that are created using a mobile device and rely on signature or certification services...
of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause...
Integrated Encryption Scheme (IES) is a hybrid encryption scheme which provides semantic security against an adversary who is able to use chosen-plaintext...