3. Signatures

preview_player
Показать описание
MIT MAS.S62 Cryptocurrency Engineering and Design, Spring 2018
Instructor: Tadge Dryja

Discussion of hash signatures, public and private keys, examples of how to use elliptic curves vs. hashes.

License: Creative Commons BY-NC-SA
Рекомендации по теме
Комментарии
Автор

Such a great initiative by MIT to spread all this knowledge for free around the globe. Bless you guys!

Sunny-tpro
Автор

I feel like I'm watching Dora the explorer whenever I yell out the answer to the screen, great content, thank you!

Esparzamx
Автор

With RSA ... one needs to mind one's Ps and Qs,

lambdapractitioner
Автор

On the elliptic curves, G is called the Generator Point because the repeated addition of G to itself generate all the numbers in the cyclic group.

ecavero
Автор

i dont understand why signature for a 32 byte would have an 8K byte signature?
i think whats not clear to me, is that if u use 32 byte secretkey. we should actually have a 16 byte signature. but if my public key is 16kb. during verification, why would my signature size increase? when im literally just comparing each block of public key selected(depending on the hash of my message whether its 0 or 1, i would eventually get a 8 kb temp "object"). now just use the hash with index on signature right?

randalllionelkharkrang
Автор

When you double your public key in the first 3 minutes aren’t you still giving away half you private key every time you sign?

I can’t see why extending the public key to 32 bytes would allow for 1 more use.

vmalonbc
Автор

I'm not getting most of the stuff, but I'm trying to assimilate atleast a bit.

kevinrandalrulach
Автор

I'm not getting most of the stuff, but I'm trying to assimilate atleast a bit. I have forgotten most stuff cos I was studying biology, brain and stuff.

kevinrandalrulach
Автор

@MIT OpenCourseWare can u share lecture 9 19 20 and 21 they are not available without those lecture (smat contracts and more) the course is not complete. so can u plzzz share those lectures

HashirPlayz
Автор

How is it at 12:00 that we have a 32-byte private key?

hahneortiz
Автор

Where can i find the presentation for lecture 3? Because on the website it poitns me to lecture 4.

Anyway great series,

jordankuzmanovik
Автор

35:00 the slide is wrong, it should read P+Q=R

nomad
Автор

where can i find pset01?? the assignment?

pakistan