@@ -622,45 +622,39 @@ using P2QRH outputs.
622622== Security ==
623623
624624{| class="wikitable"
625- |+ Candidate quantum-resistant signature algorithms ordered by largest to smallest NIST Level V signature size
625+ |+ Candidate quantum-resistant signature algorithms ordered by largest to smallest
626626|-
627- ! Signature Algorithm !! Year First Introduced !! Signature Size !! Public Key Size !! Cryptographic Assumptions
627+ ! Signature Algorithm !! Year First Introduced !! NIST Level !! Signature Size !! Public Key Size !! Cryptographic Assumptions
628628|-
629- | [https://en.wikipedia.org/wiki/Lamport_signature Lamport signature ] || 1977 || 8,192 bytes || 16,384 bytes ||
629+ | [https://en.wikipedia.org/wiki/Lamport_signature Lamport signature ] || 1977 || - || 8,192 bytes || 16,384 bytes ||
630630Hash-based cryptography
631631|-
632- | [https://eprint.iacr.org/2011/191.pdf Winternitz signature ] || 1982 || 2,368 bytes<ref name ="winternitz" >Winternitz
632+ | [https://eprint.iacr.org/2011/191.pdf Winternitz signature ] || 1982 || - || 2,368 bytes<ref name ="winternitz" >Winternitz
633633signatures are much smaller than Lamport signatures due to efficient chunking, but computation is much higher,
634634especially with high values for w. Winternitz values are for w of 4. It's worth noting that Winternitz signatures can
635635only safely be used one time per public key. If addresses are reused, private key information might be leaked, allowing
636636attackers to spend future outputs assigned to the same address.</ref> || 2,368 bytes || Hash-based cryptography
637637|-
638- | [https://sphincs.org/data/sphincs+-r3.1-specification.pdf SPHINCS+ Rd. 3.1 (FIPS 205 - SLH-DSA) ] || 2015 || 29,792
639- bytes || 64 bytes || Hash-based cryptography
638+ | [https://sphincs.org/data/sphincs+-r3.1-specification.pdf SPHINCS+ Rd. 3.1 (FIPS 205 - SLH-DSA - SHAKE-128s) ] || 2015 || 1 || 32 bytes || 7,856 bytes || Hash-based cryptography
640639|-
641640| [https://eprint.iacr.org/2011/484.pdf XMSS ]<ref name ="xmss" >XMSS, which is based on Winternitz, uses a value of 108
642641for its most compact signature size, with only a 4.6x (2.34/0.51) increase in verification time. Signing and key
643642generation are not considered a significant factor because they are not distributed throughout the entire Bitcoin
644- network, which take place only inside of wallets one time.</ref> || 2011 || 15,384 bytes || 13,568 bytes ||
643+ network, which take place only inside of wallets one time.</ref> || 2011 || - || 15,384 bytes || 13,568 bytes ||
645644Hash-based cryptography (Winternitz OTS)
646645|-
647- | [https://pq-crystals.org/dilithium/ CRYSTALS-Dilithium (FIPS 204 - ML-DSA) ] || 2017 || 4,595 bytes || 2,592 bytes ||
646+ | [https://pq-crystals.org/dilithium/ CRYSTALS-Dilithium (FIPS 204 - ML-DSA) ] || 2017 || 2 || 1,312 bytes || 2,420 bytes ||
648647Lattice cryptography
649648|-
650- | [https://eprint.iacr.org/2014/457.pdf pqNTRUsign ] || 2016 || 1,814 bytes || 1,927 bytes || Lattice cryptography (NTRU)
649+ | [https://eprint.iacr.org/2014/457.pdf pqNTRUsign ] || 2016 || - || 1,814 bytes || 1,927 bytes || Lattice cryptography (NTRU)
651650|-
652- | [https://falcon-sign.info FALCON (FIPS 206 - FN-DSA) ] || 2017 || 1,280 bytes || 1,793 bytes || Lattice cryptography
651+ | [https://falcon-sign.info FALCON (FIPS 206 - FN-DSA) ] || 2017 || 1 || 897 bytes || 666 bytes || Lattice cryptography
653652(NTRU)
654653|-
655- | [https://eprint.iacr.org/2022/1155.pdf HAWK ] || 2022 || 1,261 bytes || 2,329 bytes || Lattice cryptography
654+ | [https://eprint.iacr.org/2022/1155.pdf HAWK ] || 2022 || 1 || 1,024 bytes || 555 bytes || Lattice cryptography
656655|-
657- | [https://sqisign.org SQIsign ] || 2023 || 335 bytes || 128 bytes || Supersingular Elliptic Curve Isogeny
656+ | [https://sqisign.org SQIsign ] || 2023 || 1 || 65 bytes || 148 bytes || Supersingular Elliptic Curve Isogeny
658657|-
659- | [https://eprint.iacr.org/2024/760.pdf SQIsign2D-West ] || 2024 || 294 bytes || 130 bytes || Supersingular Elliptic
660- Curve Isogeny
661- |-
662- | [https://eprint.iacr.org/2023/436.pdf SQIsignHD ] || 2023 || 109 bytes (NIST Level I) || Not provided ||
663- Supersingular Elliptic Curve Isogeny
664658|}
665659
666660As shown, supersingular elliptic curve quaternion isogeny signature algorithms represent the state of the art in
0 commit comments