Documente Academic
Documente Profesional
Documente Cultură
CryptoNote Signatures
Abstract
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . 2
3. One-Time Ring Signatures . . . . . . . . . . . . . . . . . . . 2
4. Data Types and Accessory Functions . . . . . . . . . . . . . . 3
5. Signature Generation . . . . . . . . . . . . . . . . . . . . . 4
6. Signature Verification . . . . . . . . . . . . . . . . . . . . 4
7. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction
2. Definitions
secret key: data known to a peer only, which enables him to create
digital signatures under his identity
instead of regular, and these signatures may need multiple keys for
verification. A single secret key is needed to create a signature,
and this key must correspond to one of the public keys the signature
is verified against. Moreover, it is computationally infeasible to
recover the secret key used to create the signature. This means that
the sender of a transaction can link his inputs to multiple outputs,
making the task of tracking the funds more complex.
5. Signature Generation
6. Signature Verification
Else
Return "Incorrect"
End If
End Procedure
7. Security Considerations
8. References