ECDSA signature verification in Script
sCrypt has implemented ECDSA signature verification algorithm in Script to verify if an arbitrary message is signed by a private key corresponding to a given public key.
sCrypt has implemented ECDSA signature verification algorithm in Script to verify if an arbitrary message is signed by a private key corresponding to a given public key.
In this article, sCrypt shows how to implement Schnorr Signatures using the original Bitcoin Protocol. Schnorr is an alternative algorithm to the ECDSA algorithm currently used for signatures in Bitcoin.
Learn sCrypt is a series of lessons that split the development of an on-chain game Tic-tac-toe on the Bitcoin network into interactive chapters.
sCrypt's Xiaohui Liu demonstrated how to implement relative locktime in Bitcoin without a new opcode in part 5 of accessing blockchain from Bitcoin smart contracts.
sCrypt has developed a smart contract-based vault, where Bitcoins locked inside can only be transferred after a user defined time delay.
In part 4 of accessing blockchain from Bitcoin smart contracts, sCrypt’s Xiaohui Liu explained why the total number of transactions in a block is important and how to obtain it without a trusted third party.
sCrypt has devised a technique to fetch block height trustlessly, which is included in Coinbase transactions in this edition of how to access blockchain data from Bitcoin smart contracts.
In this post, sCrypt’s Xiaohui Liu demonstrates a cost-efficient way to provide movie streaming and other types of services on demand, based on payment channels.
In this article, Xiaohui Liu further explained how to access blockchain data from Bitcoin smart contracts and how it could be extended to include a chain of blocks.
In this article, Xiaohui Liu shows how to access blockchain data in Bitcoin smart contracts with minimal trust and provides an example of how to use that data to generate pseudo-random numbers.
In this article, Xiaohui Liu introduces nChain's white paper #0488 titled "Zero-knowledge key-statement proofs” a special ZKP where the secret is a private key corresponding to a known public key.
sCrypt has developed an algorithm to verify arbitrary data from a certain party in Bitcoin smart contracts; it is based on ECDSA and reuses native keys to generate and verify signatures directly.