Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 8 of 80
In Progress

8. Schnorr signatures – what are they? 

Schnorr signatures are digital signatures that increase the privacy and scalability of the Bitcoin network. Klaus – Peter Schnorra, a professor at Frankfurt University,  proposed this solution in 1991. He thus modified the El-Gamal and Fiat-Shimar schemes. 

Elliptic Curve digital Signature Algorithm 

When Satoshi Nakamoto thought of creating Bitcoin, signatures were very little known. Well,  when creating Bitcoin, Nakamoto had to choose one of the open-source signature methods anyway. The algorithm also had to meet all security rules. Only ECDSA  (Elliptic Curve Digital Signature Algorithm) had such requirements. This algorithm was supported by the OpenSSL protocol. What is it? It is an encryption tool to improve the quality and communication online. The ECDSA itself had significantly lower computational requirements and short keys. And with the use of additional systems, in this case RSA, it provided a considerable level of security. Significantly,  the 256-bit ECDSA key provided the same level of security as the 02072-bit RSA  key. At the same time, RSA kept a small part of its size. 

Developers who worked on improving the elliptic curve cecp256k1 further improved  ECDSA. However, the algorithm has shortcomings and deficiencies that needed to be changed. And this is where a new solution, known as Schnorr signatures, comes in. Interestingly, ECDSA’s predecessor was DSA, a hybrid of the ElGamal and  Schnorr systems. 

Schnorr’s signatures 

In 2008, Claus Schnorr’s patent expired. The exact same year that Satoshi introduced Bitcoin to the world. However, they were not very well known. This is most likely why Satoshi decided to use ECDSA. What do signatures give us? 

Benefits: 

1. Security. Signatures use a discrete logarithm. They also have the advantage that they use fewer assumptions and have reliable logical proof. The security of signatures is proven by a random oracle.  

2. Ease. The application technology using signatures is transparent and intuitive,  which definitely makes the work of cryptographers easier. 

3. Inflexibility

4. Linearity. They are implemented using linear mathematics. What does this mean? Signatures can be subject to addition and subtraction. The result is a  valid signature. The linearity of signatures allows for their aggregation; i.e.,  combining several public keys into one. 

Multisignatures based on Schnorr signatures 

Before the introduction of Schnorr signatures, public tests of a new scheme – multisignatures based on the technology of these signatures – were announced. The tests were intended to gather feedback in order to introduce error-free working code 

in the future. Multisignature schemes assume that users of a given system have full control over when and how their keys are generated. In reality, however, as is evident in the Bitcoin network, many users do not have access to their private keys. Nor do they have control over how they are created. This is why changes have been proposed – Multisignature based on Schnorr signatures. 

Schnorr signatures – implementation 

The BIP – 340 standardization was used for their implementation, which allows integration with the Bitcoin protocol. The upgrade does not cause any drastic changes to the Bitcoin network environment itself. The use of this scheme is considered the best that exists. Its mathematical properties ensure very high calculation accuracy. Transactions are confirmed very quickly. The introduction of  Schnorr signatures into the Bitcoin system is so imperceptible that only hyper-vigilant network users will notice changes in the SegWig address. The signatures will not replace ECDSA in Bitcoin. They will co-exist together. 

Schnorr Signatures part of Bitcoin’s Taproot 

Curiously, Schnorr Signatures is closely related to Bitcoin’s Taproot. Taproot, or BIP  341, is the other part of the ‘offering’. Related to Schnorr, Taproot and Tapscript. If  Schnorr offers us a new type of signature, then Taproot extends their functionality. It introduces a new version, resulting from the transaction, and a new way of specifying spending conditions. 

The Taproot update includes two elements in particular that result in greater privacy  and efficiency: 

  • Schnorr signatures, a “new” signature algorithm that is in many ways more  efficient than ECDSA, although both belong to the same family of elliptic  curves, 
  • an implementation of MAST (Merkelized Abstract Syntax Tree), called  Taproot. It is therefore necessary to distinguish between the global update and this particular element of it, which shares the same name. 

Schnorr signatures are not only more efficient (understand: faster verifiable), but above all they have a very interesting linearity characteristic of multi-signature addresses and transactions, which will become indistinguishable from more traditional single-signature addresses and transactions. When combined with MAST,  they will also allow only the actually used part of the script to be revealed, thus saving block space and keeping other script conditions secret. 

Schnorr multisignatures – how they work 

Digital signatures must provide proof that a transaction has been signed by the owner of a particular private key. In fact, it appears that the vast majority of Bitcoin users send their transactions with only one signature. This is identified by the sending address of the owner of that key. Multi signatures provide the same cryptographic proof for multiple wallet owners. Then each owner has the ability to generate their 

own signature. Schnorr signatures is a special multisignature. It is small – only 64  bytes and very easy to verify. 

Summary 

For bitcoin to be adopted en masse, it needs to have the highest possible level of security.  The growing interest around the topic of digital currencies, cryptocurrency exchanges makes bitcoin both evolve and expose itself to potential threats. The advent of Schnorr signatures in Bitcoin Core solves two major problems – privacy and the long-term stability of the network without blockchain rewards. 

Find your favorite cryptocurrencies on Kanga Exchange