©  Daniel Drescher 2017

Daniel Drescher, Blockchain Basics, 10.1007/978-1-4842-2604-9_13

13. Authorizing Transactions

Utilizing the digital equivalent to handwritten signatures

Daniel Drescher

(1)Frankfurt am Main, Germany

Step 12 provided a gentle introduction to asymmetric cryptography. It also pointed out that the blockchain uses public cryptographic keys as account numbers and utilizes the public-to-private approach of asymmetric cryptography for transferring ownership among accounts. However, that was only half of the story. The blockchain needs to ensure that only the lawful owner can transfer his or her property to other accounts. This is the point were the concept of authorization enters the scene. Hence, this step explains how asymmetric ...

Get Blockchain Basics: A Non-Technical Introduction in 25 Steps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.