sCrypt demonstrates the usage of OP_CODESEPARATOR, such as optimizing preimage size in OP_PUSH_TX and other uses like in-script functions and signing different execution paths.
To overcome the drawback of the previous Zero-knowledge key-statement proof, sCrypt conducted the exchange entirely on chain using a smart contract which only pays out if a private key is provided.
sCrypt has implemented ECDSA signature verification algorithm in Script to verify if an arbitrary message is signed by a private key corresponding to a given public key.
In this article, sCrypt shows how to implement Schnorr Signatures using the original Bitcoin Protocol. Schnorr is an alternative algorithm to the ECDSA algorithm currently used for signatures in Bitcoin.
Learn sCrypt is a series of lessons that split the development of an on-chain game Tic-tac-toe on the Bitcoin network into interactive chapters.
sCrypt's Xiaohui Liu demonstrated how to implement relative locktime in Bitcoin without a new opcode in part 5 of accessing blockchain from Bitcoin smart contracts.
sCrypt has developed a smart contract-based vault, where Bitcoins locked inside can only be transferred after a user defined time delay.
In part 4 of accessing blockchain from Bitcoin smart contracts, sCrypt’s Xiaohui Liu explained why the total number of transactions in a block is important and how to obtain it without a trusted third party.
sCrypt has devised a technique to fetch block height trustlessly, which is included in Coinbase transactions in this edition of how to access blockchain data from Bitcoin smart contracts.
sCrypt, an on-chain smart contracting solutions company, published a Medium article this week on how to facilitate streaming services using the Bitcoin protocol.
A recent sCrypt article discusses how to facilitate streaming services using the Bitcoin protocol. This is not streaming large movie data on-chain but leverages the incentive and accountability aspects of the protocol and ledger itself.