From e96341c9b775da4fd5fe676e1fd0668c06a7f8c9 Mon Sep 17 00:00:00 2001 From: "David A. Harding" Date: Sat, 8 Apr 2023 11:18:28 -1000 Subject: [PATCH] CH08: add conclusion --- chapters/signatures.adoc | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/chapters/signatures.adoc b/chapters/signatures.adoc index 0186f9fc..0d4f7498 100644 --- a/chapters/signatures.adoc +++ b/chapters/signatures.adoc @@ -1000,3 +1000,15 @@ The new algorithm allows the number of hash operations increases by a much more gradual O(n) to the number of signature operations, reducing the opportunity to create denial-of-service attacks with overly complex transactions. + +In this chapter, we learned about schnorr and ECDSA signatures for +Bitcoin. This explains how full nodes authenticate transactions to +ensure that only someone controlling the key to which bitcoins were +received can spend those bitcoins. We also examined several advanced +applications of signatures, such as scriptless multisignatures and +scriptless threshold signatures that can be used to improve the +efficiency and privacy of Bitcoin. In the past few chapters, we've +learned how to create transactions, how to secure them with +authorization and authentication, and how to sign them. We will next +learn how to encourage miners to confirm them by adding fees to the +transactions we create.