Category: Cryptographic Primitives

TumbleBit

TumbleBit is a privacy protocol designed to make Bitcoin transactions more anonymous. It works as an overlay network where users can mix their coins with others, making it difficult to trace the source and destination of funds. By using cryptographic techniques, TumbleBit ensures that no one, not even the service operator, can link incoming and…

Statechain Protocols

Statechain protocols are a type of cryptographic technology designed to transfer ownership of digital assets, such as Bitcoin, without moving them on the public blockchain. Instead, control over the asset is passed between parties using a secure chain of signatures and encrypted messages, which are verified by a trusted server called a statechain entity. This…

MuSig2 Protocol

MuSig2 is a cryptographic protocol that allows multiple people to create a single digital signature together. This makes it possible for a group to jointly authorise a transaction or message without revealing each person’s individual signature. MuSig2 is efficient, more private, and reduces the size of signatures compared to traditional multi-signature methods.

Aggregate Signatures

Aggregate signatures are a cryptographic technique that allows multiple digital signatures from different users to be combined into a single, compact signature. This combined signature can then be verified to confirm that each participant individually signed their specific message. The main benefit is that it saves space and improves efficiency, especially when dealing with many…

Threshold Signatures

Threshold signatures are a type of digital signature system where a group of people or computers can collectively sign a message, but only if a minimum number of them agree. This minimum number is called the threshold. No individual member can produce a valid signature alone, which increases security and trust. Threshold signatures are useful…

Verifiable Secret Sharing

Verifiable Secret Sharing is a cryptographic method where a secret, such as a password or encryption key, is split into several parts and distributed to different participants. Each part alone is not enough to reveal the secret. What makes the scheme verifiable is that participants can check that the shares they receive are valid and…

Light Client Protocols

Light client protocols are methods that allow devices or applications to interact with blockchains without downloading the entire blockchain history. They use efficient techniques to verify key information, such as transactions or account balances, by checking small pieces of data from full nodes. This approach makes it possible for devices with limited resources, like smartphones,…