Abstract
Bitcoin has emerged as one of the most disruptive innovations since the advent of the internet. Its core principle of decentralization has not only revolutionized the way transactions are made but also paved the way for development of an entirely new blockchain industry. Its security is achieved through the implementation of cryptographic constructs based on elliptic curve cryptography. In this paper, we delve into use of digital signatures in Bitcoin. We provide an overview of Elliptic Curve Digital Signature Algorithm (ECDSA) and the recently adopted Schnorr signatures. Furthermore, we discuss Taproot, a soft fork introduced in Bitcoin, which enhances Bitcoin’s versatility for complex applications. With Taproot, multiparty transactions can be designed with greater privacy for all parties involved, as well as for the underlying contracts. This paper offers a comprehensive review of both the ECDSA and Schnorr signature schemes, shedding light on their scripting capabilities within the Bitcoin ecosystem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł: Secure multiparty computations on bitcoin. Commun. ACM 59(4), 76–84 (2016)
Aranha, D.F., Novaes, F.R., Takahashi, A., Tibouchi, M., Yarom, Y.: LadderLeak: breaking ECDSA with less than one bit of nonce leakage. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 225–242 (2020)
Bistarelli, S., Mercanti, I., Santini, F.: An analysis of non-standard bitcoin transactions. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 93–96. IEEE (2018)
Brown, D.: Standards for efficient cryptography, sec 1: elliptic curve cryptography. Released Standard Version 1 (2009)
Decker, C., Wattenhofer, R.: Bitcoin transaction malleability and MtGox. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 313–326. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11212-1_18
Delgado-Segura, S., Pérez-Solà, C., Navarro-Arribas, G., Herrera-Joancomartí, J.: Analysis of the bitcoin UTXO set. In: Zohar, A., et al. (eds.) FC 2018. LNCS, vol. 10958, pp. 78–91. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-662-58820-8_6
Drijvers, M., et al.: On the security of two-round multi-signatures. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1084–1101. IEEE (2019)
Fleischhacker, N., Jager, T., Schröder, D.: On tight security proofs for Schnorr signatures. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 512–531. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45611-8_27
Hankerson, D., Menezes, A.: Elliptic curve cryptography. In: Jajodia, S., Samarati, P., Yung, M. (eds.) Encyclopedia of Cryptography, Security and Privacy, pp. 1–2. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-642-27739-9_245-2
Hartmann, D., Kiltz, E.: Limits in the provable security of ECDSA signatures. Cryptology ePrint Archive (2023)
Lau, J.: BIP 114: Merkelized abstract syntax tree (2016). https://github.com/bitcoin/bips/blob/master/bip-0114.mediawiki
Lombrozo, E., Lau, J., Wuille, P.: BIP 141: segregated witness (2015). https://github.com/bitcoin/bips/blob/master/bip-0141.mediawiki
Maxwell, G., Poelstra, A., Seurin, Y., Wuille, P.: Simple Schnorr multi-signatures with applications to bitcoin. Des. Codes Crypt. 87(9), 2139–2164 (2019)
McCorry, P., Möser, M., Shahandasti, S.F., Hao, F.: Towards bitcoin payment networks. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 57–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40253-6_4
Mitra, N.: Efficient encoding rules for ASN. 1-based protocols. AT &T Tech. J. 73(3), 80–93 (1994)
Morita, H., Schuldt, J.C.N., Matsuda, T., Hanaoka, G., Iwata, T.: On the security of the Schnorr signature scheme and DSA against related-key attacks. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 20–35. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30840-1_2
Nick, J., Ruffing, T., Seurin, Y.: MuSig2: simple two-round Schnorr multi-signatures. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 189–221. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_8
Pérez-Solà, C., Delgado-Segura, S., Herrera-Joancomartı, J., Navarro-Arribas, G.: Analysis of the SegWit adoption in bitcoin (2019). https://deic-web.uab.cat/guille/publications/papers/2018.recsi.segwit.pdf
Pieter, A.: Bip65: Op_checklocktimeverify (2014). https://github.com/bitcoin/bips/blob/master/bip-0065.mediawiki
Pornin, T.: Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). Technical report (2013)
Raikwar, M., Gligoroski, D., Kralevska, K.: SoK of used cryptography in blockchain. IEEE Access 7, 148550–148575 (2019)
Rowe, D., Breitner, J., Heninger, N.: The curious case of the half-half bitcoin ECDSA nonces. Cryptology ePrint Archive (2023)
Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4, 161–174 (1991)
Thyagarajan, S.A., Malavolta, G., Moreno-Sanchez, P.: Universal atomic swaps: secure exchange of coins across all blockchains. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1299–1316. IEEE (2022)
Ullah, S., Zheng, J., Din, N., Hussain, M.T., Ullah, F., Yousaf, M.: Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey. Comput. Sci. Rev. 47, 100530 (2023)
Wuille, A.P., Nick, J., Towns, A.: BIP341: taproot: SegWit version 1 spending rules (2020). https://github.com/bitcoin/bips/blob/master/bip-0341.mediawiki
Wuille, Nick, J., Towns, A.: BIP342: validation of taproot scripts (2020). https://github.com/bitcoin/bips/blob/master/bip-0342.mediawiki
Wuille, P., Nick, J., Ruffing, T.: BIP 340: Schnorr signatures for sec256k1 (2020). https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jain, A., Pilli, E.S. (2023). SoK: Digital Signatures and Taproot Transactions in Bitcoin. In: Muthukkumarasamy, V., Sudarsan, S.D., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2023. Lecture Notes in Computer Science, vol 14424. Springer, Cham. https://doi.org/10.1007/978-3-031-49099-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-031-49099-6_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49098-9
Online ISBN: 978-3-031-49099-6
eBook Packages: Computer ScienceComputer Science (R0)