Step 12 provided a gentle introduction to asymmetric cryptography. It also pointed out that the blockchain uses public cryptographic keys as account numbers and utilizes the public-to-private approach of asymmetric cryptography for transferring ownership among accounts. However, that was only half of the story. The blockchain needs to ensure that only the lawful owner can transfer his or her property to other accounts. This is the point were the concept of authorization enters the scene. Hence, this step explains how asymmetric ...
© Daniel Drescher 2017
Daniel Drescher, Blockchain Basics, 10.1007/978-1-4842-2604-9_13
13. Authorizing Transactions
Utilizing the digital equivalent to handwritten signatures
Daniel Drescher1
(1)Frankfurt am Main, Germany
Get Blockchain Basics: A Non-Technical Introduction in 25 Steps now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.