Skip to main content

SoK: Digital Signatures and Taproot Transactions in Bitcoin

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14424))

Included in the following conference series:

  • 788 Accesses

Abstract

Bitcoin has emerged as one of the most disruptive innovations since the advent of the internet. Its core principle of decentralization has not only revolutionized the way transactions are made but also paved the way for development of an entirely new blockchain industry. Its security is achieved through the implementation of cryptographic constructs based on elliptic curve cryptography. In this paper, we delve into use of digital signatures in Bitcoin. We provide an overview of Elliptic Curve Digital Signature Algorithm (ECDSA) and the recently adopted Schnorr signatures. Furthermore, we discuss Taproot, a soft fork introduced in Bitcoin, which enhances Bitcoin’s versatility for complex applications. With Taproot, multiparty transactions can be designed with greater privacy for all parties involved, as well as for the underlying contracts. This paper offers a comprehensive review of both the ECDSA and Schnorr signature schemes, shedding light on their scripting capabilities within the Bitcoin ecosystem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł: Secure multiparty computations on bitcoin. Commun. ACM 59(4), 76–84 (2016)

    Article  Google Scholar 

  2. Aranha, D.F., Novaes, F.R., Takahashi, A., Tibouchi, M., Yarom, Y.: LadderLeak: breaking ECDSA with less than one bit of nonce leakage. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 225–242 (2020)

    Google Scholar 

  3. Bistarelli, S., Mercanti, I., Santini, F.: An analysis of non-standard bitcoin transactions. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 93–96. IEEE (2018)

    Google Scholar 

  4. Brown, D.: Standards for efficient cryptography, sec 1: elliptic curve cryptography. Released Standard Version 1 (2009)

    Google Scholar 

  5. Decker, C., Wattenhofer, R.: Bitcoin transaction malleability and MtGox. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 313–326. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11212-1_18

    Chapter  Google Scholar 

  6. Delgado-Segura, S., Pérez-Solà, C., Navarro-Arribas, G., Herrera-Joancomartí, J.: Analysis of the bitcoin UTXO set. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 78–91. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-662-58820-8_6

    Chapter  Google Scholar 

  7. Drijvers, M., et al.: On the security of two-round multi-signatures. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1084–1101. IEEE (2019)

    Google Scholar 

  8. Fleischhacker, N., Jager, T., Schröder, D.: On tight security proofs for Schnorr signatures. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 512–531. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45611-8_27

    Chapter  Google Scholar 

  9. Hankerson, D., Menezes, A.: Elliptic curve cryptography. In: Jajodia, S., Samarati, P., Yung, M. (eds.) Encyclopedia of Cryptography, Security and Privacy, pp. 1–2. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-642-27739-9_245-2

    Chapter  Google Scholar 

  10. Hartmann, D., Kiltz, E.: Limits in the provable security of ECDSA signatures. Cryptology ePrint Archive (2023)

    Google Scholar 

  11. Lau, J.: BIP 114: Merkelized abstract syntax tree (2016). https://github.com/bitcoin/bips/blob/master/bip-0114.mediawiki

  12. Lombrozo, E., Lau, J., Wuille, P.: BIP 141: segregated witness (2015). https://github.com/bitcoin/bips/blob/master/bip-0141.mediawiki

  13. Maxwell, G., Poelstra, A., Seurin, Y., Wuille, P.: Simple Schnorr multi-signatures with applications to bitcoin. Des. Codes Crypt. 87(9), 2139–2164 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  14. McCorry, P., Möser, M., Shahandasti, S.F., Hao, F.: Towards bitcoin payment networks. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 57–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40253-6_4

    Chapter  Google Scholar 

  15. Mitra, N.: Efficient encoding rules for ASN. 1-based protocols. AT &T Tech. J. 73(3), 80–93 (1994)

    Article  Google Scholar 

  16. Morita, H., Schuldt, J.C.N., Matsuda, T., Hanaoka, G., Iwata, T.: On the security of the Schnorr signature scheme and DSA against related-key attacks. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 20–35. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30840-1_2

    Chapter  MATH  Google Scholar 

  17. Nick, J., Ruffing, T., Seurin, Y.: MuSig2: simple two-round Schnorr multi-signatures. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 189–221. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_8

    Chapter  Google Scholar 

  18. Pérez-Solà, C., Delgado-Segura, S., Herrera-Joancomartı, J., Navarro-Arribas, G.: Analysis of the SegWit adoption in bitcoin (2019). https://deic-web.uab.cat/guille/publications/papers/2018.recsi.segwit.pdf

  19. Pieter, A.: Bip65: Op_checklocktimeverify (2014). https://github.com/bitcoin/bips/blob/master/bip-0065.mediawiki

  20. Pornin, T.: Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). Technical report (2013)

    Google Scholar 

  21. Raikwar, M., Gligoroski, D., Kralevska, K.: SoK of used cryptography in blockchain. IEEE Access 7, 148550–148575 (2019)

    Article  Google Scholar 

  22. Rowe, D., Breitner, J., Heninger, N.: The curious case of the half-half bitcoin ECDSA nonces. Cryptology ePrint Archive (2023)

    Google Scholar 

  23. Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4, 161–174 (1991)

    Article  MATH  Google Scholar 

  24. Thyagarajan, S.A., Malavolta, G., Moreno-Sanchez, P.: Universal atomic swaps: secure exchange of coins across all blockchains. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1299–1316. IEEE (2022)

    Google Scholar 

  25. Ullah, S., Zheng, J., Din, N., Hussain, M.T., Ullah, F., Yousaf, M.: Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey. Comput. Sci. Rev. 47, 100530 (2023)

    Article  MathSciNet  MATH  Google Scholar 

  26. Wuille, A.P., Nick, J., Towns, A.: BIP341: taproot: SegWit version 1 spending rules (2020). https://github.com/bitcoin/bips/blob/master/bip-0341.mediawiki

  27. Wuille, Nick, J., Towns, A.: BIP342: validation of taproot scripts (2020). https://github.com/bitcoin/bips/blob/master/bip-0342.mediawiki

  28. Wuille, P., Nick, J., Ruffing, T.: BIP 340: Schnorr signatures for sec256k1 (2020). https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anubha Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jain, A., Pilli, E.S. (2023). SoK: Digital Signatures and Taproot Transactions in Bitcoin. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2023. Lecture Notes in Computer Science, vol 14424. Springer, Cham. https://doi.org/10.1007/978-3-031-49099-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49099-6_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49098-9

  • Online ISBN: 978-3-031-49099-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics