transactions – How could be confirmed {that a} signature is legitimate with it is public key

0
28


When signing the transaction, a sha256 hash of the transaction knowledge is taken, and a ECDSA signature of this hash is generated utilizing the personal key.

When validating the signature, we first generate the sha256 hash of the transaction knowledge the identical method, then we validate the signature utilizing the ECDSA algorithm by passing within the signature, the general public key, and the transaction hash.



Supply hyperlink

Leave a reply