Suredbits Lightning Network

Schnorr Security Part 2: From ID to Signature

In the last blog post, we began laying out the groundwork for what will become an argument that Schnorr signatures are secure. We discovered the Schnorr Identity Protocol and proved that it is secure and correct (specifically Complete, Sound, and …

Read More

Schnorr Security Part 1: Schnorr ID Protocol

In the previous post of our introductory Schnorr series, we discussed the definition of Schnorr signatures and tried to build some intuition as to how Schnorr signatures work by looking at a sequence of choices that could have led us …

Read More

Introduction to Schnorr Signatures

Welcome to the introductory Suredbits Schnorr blog series! In this post I will explain what Schnorr signatures are and how they intuitively work. In the next post, I will present some evidence as to why this scheme is secure and …

Read More

Activating Taproot

Bitcoin has gone through many upgrades during its history. Taproot is being proposed as the next improvement to the network.  We won’t be going into what taproot is and what it enables in this blog, but you can expect some …

Read More