Technical Background

Cryptographic Hash functions

· Efficient: it is very fast to compute the hash value for any given message.

· Pre-image resistance (one-wayness): For essentially all pre-specified outputs, it is computationally infeasible to find any input which hashed to that output.

· Second pre-image resistance It is computationally infeasible to find a second message that produces the same hash value.

Digital Signatures: ECDSA Signing Algorithm

Key generation:

Signature generation:

Signature verification:

Aggregated Signatures

BLS 12381




One of the most important properties of BLS signatures is that they can be aggregated

BN256 Curves

Last updated