Reference implementation of the picnic post-quantum signature scheme - picnic/picnic. h at master microsoft/picnic To generate her signing key, peggy (the prover) generates a random symmetric key. This will be her private key (sk).

The picnic_signature_size () function calculates the maximum signature size for a given parameter set, accounting for differences between picnic variants and transform types.