Signing transactions

In this video, Andreas Antonopoulos helps us understand the concepts of public addresses and private keys by using an analogy involving public lockboxes.

Creator
Time
URL
circle-info

Takeaway Private keys are inexpressibly secure from brute force attacks, and they are used to proof ownership of public addresses by signing a transaction. This is done in a way that does not require revealing the private key itself.

Last updated