Abstract
Step 12 provided a gentle introduction to asymmetric cryptography. It also pointed out that the blockchain uses public cryptographic keys as account numbers and utilizes the public-to-private approach of asymmetric cryptography for transferring ownership among accounts. However, that was only half of the story. The blockchain needs to ensure that only the lawful owner can transfer his or her property to other accounts. This is the point were the concept of authorization enters the scene. Hence, this step explains how asymmetric cryptography is used within the blockchain for authorizing transactions. In particular, this step is devoted to the concept of digital signatures, which utilize the private-to-public approach of asymmetric cryptography.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Daniel Drescher
About this chapter
Cite this chapter
Drescher, D. (2017). Authorizing Transactions. In: Blockchain Basics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2604-9_13
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2604-9_13
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2603-2
Online ISBN: 978-1-4842-2604-9
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)