Digital Signatures

What is a digital signature?

A digital signature is used to show that you know the private key connected to a public key, without having to reveal the private key.

Illustration showing how a digital signature is created from a private key and proves you are the owner of the public key.

So if anyone ever asks if you have the private key for a specific public key (or address), you can give them a digital signature to prove it.

Why do we use digital signatures in Bitcoin?

When you make a transaction, you need to unlock the outputs you want to spend.

To do this you need to show that you "own" the output. This is done by proving that you know the private key of the address the output is locked to:

Diagram showing transaction data containing an input with a lock on it.

But if you put your private key into the transaction data directly, everyone on the network will be able to see it:

Diagram showing transaction data with an input that is being unlocked using a private key directly.

And if anyone gets your private key, they can use it to unlock and spend any other outputs that have been locked to that same address.

So how can we unlock outputs without giving away our private key?

Enter the digital signature

A digital signature can be created from a private key to prove that we know the private key for an address.

This means we can use a digital signature to unlock outputs without having to give away our private key:

Diagram showing transaction data with an input that is being unlocked using a digital signature.

This is why we use digital signatures instead of putting our private keys directly into the transaction data.

What prevents someone from reusing a digital signature?

Good question. After all, if the private key will unlock any output locked to an address, why can't someone take the digital signature and use it to do the same thing?

Answer: Because every digital signature is tied to a transaction.

In other words; you don't just use your private key to make a digital signature; you use your private key and the original transaction data itself:

Diagram showing how a digital signature is created using a private key and some transaction data.

Therefore, each digital signature is tied to the transaction it is being used in:

Diagram showing how a digital signature is tied to the transaction data it is being used in.

So if someone tries to use this digital signature in a different transaction, it will not match the transaction data that was used to create it, and nodes on the bitcoin network will reject it.

Diagram showing how a digital signature must be contained within the same transaction data that was used to create it for it to be valid.

Furthermore, the digital signature also protects against anyone tampering with a transaction. Because if the transaction data is changed (e.g. someone tries to change the amount being sent or where it is sent to), the digital signature will no longer work.

How do digital signatures work?

Mathematics, good old mathematics.

There are two parts to using digital signatures:

  1. Signing: You combine the private key + transaction data, and use some mathematics to create a digital signature.
  2. Verifying: You can then take the digital signature + transaction data + public key, perform some more mathematics, and the result will confirm whether a legitimate private key was used to create the digital signature.

Because remember, the goal of a using a digital signature is to prove that you're the owner of a public key.

Don't forget that an address is just an encoding of a public key. So even though you send bitcoins to an address, you're actually locking them to a public key.

I know the process seems like smoke and mirrors magic at first, but it's honestly just mathematics underneath.

How do you create a digital signature?

A digital signature contains two parts:

  1. A random part.
  2. A signature part.

1. Random Part

Start by generating a large random number.

You then multiply this with the generator point on the elliptic curve (the same generator point used when making a public key):

Diagram showing the generator point being multiplied by a large random number.

The random part of our digital signature is the point on the curve that we end up with. But we'll just take the x-coordinate of it:

Diagram showing the x-coordinate being taken from the random point on the curve.

We'll call this "r" for short.

Illustration showing r (the x coordinate of the random point) as the first part of a digital signature.

So now we've got the first half of our digital signature ready, but we haven't used our private key for anything yet. This is where the second half comes in…

2. Signature Part

Next we take our private key, and multiply it with r (the x-coordinate of that random point on the curve we just found).

Diagram showing r being multiplied by the private key.

Next we add the thing we want to sign. This is called the message. In Bitcoin, the message is the hash of the entire transaction data that contains the output that we want to unlock:

Diagram showing the message we want to sign being added to (r multiplied by the private key).

Including transaction hash ties the signature to one transaction (so it can't be used within a different transaction).

Finally, for good measure, we divide all of this by that initial random number we started with:

Diagram showing the random part of the signature being divided by r.

And hey presto, we have the vital "signature" part of our digital signature. We'll call this s for short.

Illustration showing r and s as the two parts of a digital signature.

Mr. D Signature.

Now here's the fun bit…

If someone asks us to prove that we know the private key for a public key, we can give them our digital signature (r and s) as proof.

But how the hell can someone use this as proof?

How do you verify a digital signature?

To verify that a digital signature was made using a correct private key, the person you give this digital signature to needs to use both parts to find two new points on the elliptic curve:

Point 1

Divide the message by s. The first point is then the generator point multiplied by this value:

Diagram showing point 1 on the elliptic curve during signature verification.

Point 2

Divide r by s. The second point is then the public key multiplied by this value:

Diagram showing point 2 on the elliptic curve during signature verification.

Verification

Now if we add these two points together, we will get a third point on the curve:

Diagram showing the result of adding point 1 and point 2 on the elliptic curve.

And if the x-coordinate of this third point is the same as the x-coordinate of the random point we started with (r), then this is proof that the digital signature was created using the private key connected to this public key.

Diagram showing the x coordinate of point 3 being equal to the x coordinate of the random point in the signature.

This is a simplified explanation of the mathematics involved in digital signatures. For a more technical explanation, see ECDSA.

Resources