Elliptic Curve Cryptography in Bitcoin
Saravanan Vijayakumaran sarva@ee.iitb.ac.in
Department of Electrical Engineering Indian Institute of Technology Bombay
August 8, 2019
1 / 31
Elliptic Curve Cryptography in Bitcoin Saravanan Vijayakumaran - - PowerPoint PPT Presentation
Elliptic Curve Cryptography in Bitcoin Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay August 8, 2019 1 / 31 Group Theory Recap Groups Definition A set G with a binary
Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 31
3 / 31
n = {i ∈ Zn \ {0} | gcd(i, n) = 1}
n is cyclic if n is a prime
4 / 31
5 / 31
−2 2 −4 −2 2 4
−2 2 −4 −2 2 4
7 / 31
8 / 31
9 / 31
1 + a
1 + a
10 / 31
12 / 31
13 / 31
14 / 31
2 4 6 8 10 2 4 6 8 10 x y
2 4 6 8 10 2 4 6 8 10 x y
15 / 31
16 / 31
17 / 31
18 / 31
p, best DL algorithms are sub-exponential in N = ⌈log2 p⌉
p
19 / 31
21 / 31
?
22 / 31
?
23 / 31
q and sends I := gk
?
q and sets r := F(gk)
24 / 31
n
25 / 31
nVersion Number of Inputs N hash n scriptSigLen scriptSig nSequence . . . hash n scriptSigLen scriptSig nSequence Number of Outputs M nValue scriptPubkeyLen scriptPubkey . . . nValue scriptPubkeyLen scriptPubkey nLockTime
Input 0 Input N − 1 Output 0 Output M − 1 Double SHA-256 Hash Tx ID
27 / 31
28 / 31
Input unlocking x bitcoins from Alice’s UTXO Output locked by 2-of-2 multisig challenge script
Input with hash = i1 and n = 0 unlocking the 2-of-2 multisig output in t1 Output returning funds to Alice
Input 0 Output 0 Input 0 Output 0 Bob Alice Network
t1 confirmation
t2 confirmation
29 / 31
Bob Alice Network
5 . B r
d c a s t t
1
6 . B r
d c a s t t′
1
t′
1 confirmation
1 transaction cannot be spent by t2
30 / 31
31 / 31