Schnorr Applications: Threshold Signatures

In today’s installment of the Suredbits Schnorr Series, we will begin our exploration of threshold signatures schemes! We will discuss various uses for threshold signatures and then go on to describe three different ways of doing threshold signatures, each with …

Read More

Schnorr Applications: Batch Verification

So far in this series, we’ve discussed what Schnorr signatures are, why they are secure, and how Schnorr variants can be used to implement private and scalable multi-signatures and scriptless scripts using adaptor signatures. Today we will be looking at yet …

Read More

Schnorr Applications: Scriptless Scripts

In this post we continue our survey of Schnorr-enabled schemes and their applications to Bitcoin by exploring the exciting world of Scriptless Scripts which are enabled by a signature scheme called Adaptor Signatures. I will note that while it is …

Read More

Schnorr Applications: MuSig

Welcome to this week’s installment of the introductory Schnorr blog series! So far we have covered (in extreme depth) what Schnorr signatures are and why they work securly. If you didn’t follow or haven’t read the last two posts (detailing …

Read More
Suredbits Lightning Network

Schnorr Security Part 2: From ID to Signature

In the last blog post, we began laying out the groundwork for what will become an argument that Schnorr signatures are secure. We discovered the Schnorr Identity Protocol and proved that it is secure and correct (specifically Complete, Sound, and …

Read More

Schnorr Security Part 1: Schnorr ID Protocol

In the previous post of our introductory Schnorr series, we discussed the definition of Schnorr signatures and tried to build some intuition as to how Schnorr signatures work by looking at a sequence of choices that could have led us …

Read More

Introduction to Schnorr Signatures

Welcome to the introductory Suredbits Schnorr blog series! In this post I will explain what Schnorr signatures are and how they intuitively work. In the next post, I will present some evidence as to why this scheme is secure and …

Read More

Activating Taproot

Bitcoin has gone through many upgrades during its history. Taproot is being proposed as the next improvement to the network.  We won’t be going into what taproot is and what it enables in this blog, but you can expect some …

Read More
Suredbits Lightning Map

Generalized Bitcoin Channels

In this post we will delve into the new ideas brought forward in the paper “Generalized Bitcoin-Compatible Channels” for improving the future Lightning Network. Section: Paper Takeaways Let us start by summarizing the higher-level contents of the “Generalized Bitcoin-Compatible Channels” …

Read More

Discreet Log Contracts in VR!

This weekend Ben gave a talk at Reckless VR about the Basics of DLCs. He talked about a wide range of topics related to DLCs from the oracle problem, to how DLCs work, and even about what it takes to …

Read More