Intro: Signatures and Authentication

Now we’ll go into how to use digital signatures to send messages and transactions both pseudonymously and trustlessly.

In the previous section, we showed how transactions contained in previous blocks in the blockchain are tamper evident.

Using digital signatures, we can also ensure that the current transactions we send to the rest of the network are tamper evident as well.

Recall from early in the course that our motivation for having signatures is to authenticate identity, so that you know a message you receive could only have come from one other user, because it was signed with that user’s specific private key, proving ownership of a public key.

In this next section, we’ll go over what we want from a digital signature scheme at a high level.

Digital Signature Schemes