Signing transactions

In this video, Andreas Antonopoulos helps us understand the concepts of public addresses and private keys by using an analogy involving public lockboxes.

CreatorTimeURL

3Blue1Brown

4min

Takeaway Private keys are inexpressibly secure from brute force attacks, and they are used to proof ownership of public addresses by signing a transaction. This is done in a way that does not require revealing the private key itself.

Last updated