SoK: Digital Signatures and Taproot Transactions in Bitcoin

被引:0
作者
Jain, Anubha [1 ]
Pilli, Emmanuel S. [1 ]
机构
[1] Malaviya Natl Inst Technol, Jaipur 302017, Rajasthan, India
来源
INFORMATION SYSTEMS SECURITY, ICISS 2023 | 2023年 / 14424卷
关键词
Bitcoin; Digital signature; ECDSA; Schnorr signature; Taproot;
D O I
10.1007/978-3-031-49099-6_22
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Bitcoin has emerged as one of the most disruptive innovations since the advent of the internet. Its core principle of decentralization has not only revolutionized the way transactions are made but also paved the way for development of an entirely new blockchain industry. Its security is achieved through the implementation of cryptographic constructs based on elliptic curve cryptography. In this paper, we delve into use of digital signatures in Bitcoin. We provide an overview of Elliptic Curve Digital Signature Algorithm (ECDSA) and the recently adopted Schnorr signatures. Furthermore, we discuss Taproot, a soft fork introduced in Bitcoin, which enhances Bitcoin's versatility for complex applications. With Taproot, multiparty transactions can be designed with greater privacy for all parties involved, as well as for the underlying contracts. This paper offers a comprehensive review of both the ECDSA and Schnorr signature schemes, shedding light on their scripting capabilities within the Bitcoin ecosystem.
引用
收藏
页码:360 / 379
页数:20
相关论文
共 28 条
[1]   Secure Multiparty Computations on Bitcoin [J].
Andrychowicz, Marcin ;
Dziembowski, Stefan ;
Malinowski, Daniel ;
Mazurek, Lukasz .
COMMUNICATIONS OF THE ACM, 2016, 59 (04) :76-84
[2]   LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage [J].
Aranha, Diego F. ;
Novaes, Felipe Rodrigues ;
Takahashi, Akira ;
Tibouchi, Mehdi ;
Yarom, Yuval .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :225-242
[3]   Short Paper: An Analysis of Non-standard Bitcoin Transactions [J].
Bistarelli, Stefano ;
Mercanti, Ivan ;
Santini, Francesco .
2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, :93-96
[4]  
Brown D. R. L., 2009, Standards for Efficient Cryptography
[5]  
Decker C, 2014, LECT NOTES COMPUT SC, V8713, P313, DOI 10.1007/978-3-319-11212-1_18
[6]  
Delgado-Segura S., 2018, P INT C FIN CRYPT DA, P78
[7]   On the Security of Two-Round Multi-Signatures [J].
Drijvers, Manu ;
Edalatnejad, Kasra ;
Ford, Bryan ;
Kiltz, Eike ;
Loss, Julian ;
Neven, Gregory ;
Stepanovs, Igors .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1084-1101
[8]  
Fleischhackerl N, 2014, LECT NOTES COMPUT SC, V8873, P512, DOI 10.1007/978-3-662-45611-8_27
[9]  
Hankerson D., 2021, Encyclopedia of Cryptography, Security and Privacy, P1
[10]  
Hartmann D., 2023, Cryptology ePrint Archive