A BLS digital signature, also known as Boneh–Lynn–Shacham[1] (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic.
The scheme uses a bilinear pairing for verification, and signatures are elements of an elliptic curve group. Working in an elliptic curve group provides some defense against index calculus attacks (with the caveat that such attacks are still possible in the target group of the pairing), allowing shorter signatures than FDH signatures for a similar level of security.
Signatures produced by the BLS signature scheme are often referred to as short signatures, BLS short signatures, or simply BLS signatures.[2] The signature scheme is provably secure (the scheme is existentially unforgeable under adaptive chosen-message attacks) in the random oracle model assuming the intractability of the computational Diffie–Hellman problem in a gap Diffie–Hellman group.[1]
^ abCite error: The named reference BLS2004 was invoked but never defined (see the help page).
^Cite error: The named reference Eth2spec20200904 was invoked but never defined (see the help page).
and 23 Related for: BLS digital signature information
A BLSdigitalsignature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
A digitalsignature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digitalsignature on a message gives...
Brillouin Scattering (or Brillouin Light Scattering) BLSdigitalsignature, a cryptographic signature for verifying that a system validated a transaction...
The DigitalSignature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digitalsignatures, based on the mathematical...
In cryptography, the Elliptic Curve DigitalSignature Algorithm (ECDSA) offers a variant of the DigitalSignature Algorithm (DSA) which uses elliptic-curve...
The ElGamal signature scheme is a digitalsignature scheme which is based on the difficulty of computing discrete logarithms. It was described by Taher...
Schnorr signature is a digitalsignature produced by the Schnorr signature algorithm that was described by Claus Schnorr. It is a digitalsignature scheme...
cryptography, a Lamport signature or Lamport one-time signature scheme is a method for constructing a digitalsignature. Lamport signatures can be built from...
signature scheme is a digitalsignature scheme based on Merkle trees (also called hash trees) and one-time signatures such as the Lamport signature scheme...
Digitalsignatures are a means to protect digital information from intentional modification and to authenticate the source of digital information. Public...
A Quantum DigitalSignature (QDS) refers to the quantum mechanical equivalent of either a classical digitalsignature or, more generally, a handwritten...
versions of PGP, and other cryptosystems. The DigitalSignature Algorithm (DSA) is a variant of the ElGamal signature scheme, which should not be confused with...
an entity via digitalsignatures. A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates which...
Rabin signature scheme in 1978 by Michael O. Rabin. The Rabin signature scheme was the first digitalsignature scheme where forging a signature could...
with 256 bit keys Elliptic-curve Diffie–Hellman and Elliptic Curve DigitalSignature Algorithm with curve P-384 SHA-2 with 384 bits, Diffie–Hellman key...
BLISS (short for Bimodal Lattice Signature Scheme) is a digitalsignature scheme proposed by Léo Ducas, Alain Durmus, Tancrède Lepoint and Vadim Lyubashevsky...
the encryption of McEliece. Niederreiter can be used to construct a digitalsignature scheme. A special case of Niederreiter's original proposal was broken...
cryptography is also used for implementing digitalsignature schemes. A digitalsignature is reminiscent of an ordinary signature; they both have the characteristic...
Netherlands, and Germany. They also developed the related and complementary signature scheme Dilithium, as another component of their "Cryptographic Suite for...
of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause...
are the secret key material of a public key cryptography or of a Digitalsignature scheme. The method primarily enforces the decryption or the signing...
3-2013 on 7 November 2019. This specification includes key agreement, signature, and encryption schemes using several mathematical approaches: integer...