Skip to main content

Authorizing Transactions

Utilizing the digital equivalent to handwritten signatures

  • Chapter
  • First Online:
Blockchain Basics
  • 15k Accesses

Abstract

Step 12 provided a gentle introduction to asymmetric cryptography. It also pointed out that the blockchain uses public cryptographic keys as account numbers and utilizes the public-to-private approach of asymmetric cryptography for transferring ownership among accounts. However, that was only half of the story. The blockchain needs to ensure that only the lawful owner can transfer his or her property to other accounts. This is the point were the concept of authorization enters the scene. Hence, this step explains how asymmetric cryptography is used within the blockchain for authorizing transactions. In particular, this step is devoted to the concept of digital signatures, which utilize the private-to-public approach of asymmetric cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Daniel Drescher

About this chapter

Cite this chapter

Drescher, D. (2017). Authorizing Transactions. In: Blockchain Basics. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2604-9_13

Download citation

Publish with us

Policies and ethics