Introduction
In this chapter, we will cover three areas where BSV uses ECDSA (secp256k1):
BSV Transactions - The application of digital signatures in transactions is an integral part of the BSV protocol. Therefore, it is critical to understand BSV transactions clearly.
Signed Messages - This is not a widely used feature of BSV, but it has an important purpose.
Miner Identification on BSV network - This is an optional feature and its implemenation is currently left to the discretion of miners.
In the next lesson, we will aim to first understand BSV Transaction at a very high level. This will provide a platform to further understand the application of ECDSA (secp256k1). In the subsequent lessons, we will cover the two remaining topics of Signed Messages and Miner Identification. It is assumed that participants of this course have no or minimal knowledge of BSV.
Last updated
Was this helpful?