{"id":482310,"date":"2018-04-30T13:42:30","date_gmt":"2018-04-30T20:42:30","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=482310"},"modified":"2020-03-13T17:40:08","modified_gmt":"2020-03-14T00:40:08","slug":"picnic","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/picnic\/","title":{"rendered":"Picnic"},"content":{"rendered":"

\u201cPicnic\u201d is the code name for a post-quantum digital signature algorithm. Picnic is developed in collaboration with researchers and engineers from Aarhus University, AIT Austrian Institute of Technology GmbH, DFINITY, Graz University of Technology, Georgia Tech, Microsoft Research, Northwestern University, Princeton University, the Technical University of Denmark, and the University of Maryland.<\/p>\n

Unlike most other public-key cryptography, Picnic isn\u2019t based on hard problems from number theory. Instead, it uses what is called a zero-knowledge proof \u2013 where Alice can convince Bob that she knows a secret, without disclosing the secret itself. Picnic uses this concept together with symmetric cryptography, hash functions, and block ciphers, to create a novel signature scheme. The hard problems Picnic relies on for security relate only to hash functions and block ciphers, that are thought to be secure against quantum attacks.<\/p>\n

Further information on Picnic can be found in its specification and other materials available at the Picnic website (opens in new tab)<\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

\u201cPicnic\u201d is the code name for a post-quantum digital signature algorithm, using a uses what is called a zero-knowledge proof concept.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[243138,13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-482310","msr-project","type-msr-project","status-publish","hentry","msr-research-area-quantum","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[377402,944913,736459,736474,736483,736489],"related-downloads":[428430],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Melissa Chase","user_id":32878,"people_section":"Section name 1","alias":"melissac"},{"type":"guest","display_name":"David Derler","user_id":483492,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Steven Goldfeder","user_id":483498,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Jonathan Katz","user_id":588970,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Vladimir Kolesnikov","user_id":588976,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Claudio Orlandi","user_id":483504,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Sebastian Ramacher","user_id":483513,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Christian Rechberger","user_id":483516,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Daniel Slamanig","user_id":483510,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Xiao Wang","user_id":588973,"people_section":"Section name 1","alias":""},{"type":"user_nicename","display_name":"Greg Zaverucha","user_id":31912,"people_section":"Section name 1","alias":"gregz"}],"msr_research_lab":[199565],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482310"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":13,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482310\/revisions"}],"predecessor-version":[{"id":643173,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482310\/revisions\/643173"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=482310"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=482310"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=482310"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=482310"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=482310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}