Blockchains and Application in Bitcoins

Math Online Tom Circle

Encryption & Decryption: ECC (Elliptic Curve Cryptography):

Sending End: Encryption

1) SHA algorithm generates “Digital Signature” ;

2) Generate random “Private Key”.

第3-6步骤:

3) ECC encrypts the text with “Private Key”;

4) From the Private Key generates a “Public Key”;

5) Send out the “original message” and the “Public Key” with the “encrypted message” from 3);

Receiving End: Decryption

6) ECC with Public Key generates Digital Signature 1 (S1);

7) Use SHA algorithm on the original message generates Digital Signature 2 (S2);

8) If S1 = S2, then accept transaction, otherwise reject.

https://mp.weixin.qq.com/s/cLhycZBxkcl5oYNDsElUTg

View original post

Advertisements

About tomcircle

Math amateur
This entry was posted in maths tuition. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.