In the second part of this series on why it's more advantageous to run DeFi on Bitcoin, Xiaohui Liu illustrated how to build non-fungible tokens (NFT) and sell them directly on Bitcoin.
In the first part of this series on why it's more advantageous to run DeFi on Bitcoin, sCrypt demonstrates how to implement fungible tokens and swap them atomically.
sCrypt's Xiaohui Liu showed how to use smart contracts to slash cheating Sensible oracles, which is applicable to any oracle where evidence of fraud can be verified in a smart contract.
sCrypt demonstrates the usage of OP_CODESEPARATOR, such as optimizing preimage size in OP_PUSH_TX and other uses like in-script functions and signing different execution paths.
To overcome the drawback of the previous Zero-knowledge key-statement proof, sCrypt conducted the exchange entirely on chain using a smart contract which only pays out if a private key is provided.
sCrypt has implemented ECDSA signature verification algorithm in Script to verify if an arbitrary message is signed by a private key corresponding to a given public key.
In this article, sCrypt shows how to implement Schnorr Signatures using the original Bitcoin Protocol. Schnorr is an alternative algorithm to the ECDSA algorithm currently used for signatures in Bitcoin.
Learn sCrypt is a series of lessons that split the development of an on-chain game Tic-tac-toe on the Bitcoin network into interactive chapters.
sCrypt's Xiaohui Liu demonstrated how to implement relative locktime in Bitcoin without a new opcode in part 5 of accessing blockchain from Bitcoin smart contracts.
In part 4 of accessing blockchain from Bitcoin smart contracts, sCrypt’s Xiaohui Liu explained why the total number of transactions in a block is important and how to obtain it without a trusted third party.
sCrypt has devised a technique to fetch block height trustlessly, which is included in Coinbase transactions in this edition of how to access blockchain data from Bitcoin smart contracts.