Professional Documents
Culture Documents
MIT Notes
MIT Notes
en]
Chapter 2
Chapter 3
1. Cryptographic primitive
a. Hash function
b. Digital signature – asymmetric cryptography
2. Bitcoin technical features
a. Cryptography hash functions
i. Digital fingerprints for data
ii.
b. Timestamped append-only logs (blocks)
c. Block headers & merkle trees
d. Asymmetric crypto (private/public key) & digital signature
i. Digital signature algorithms
1. Generate key pairs - (private (PK)/public keys (sk)) from random
number
2. Signature – creates digital signature (Sig) from message (m) and private
key (sk)
3. Verification - verifies if a signature (sig) is valid for a message (m) and a
public key (PK)
ii. Properties
1. Infeasible to find private key from public key
2. All valid signatures verifies
3. Signatures infeasible to forge
iii. Bitcoin Digital signature function
1. Elliptic curve digital signature algorithm
e. Proof of work (consensus)
f. Network of nodes
g. Native currency (part of economic incentive system)
[Op
en]
h. Transaction inputs & outputs
i. Unspent tx output (UTXO)
j. Scripting language