Course 1 · Foundations of Blockchain and Cryptography

Module 3: Public-Key Cryptography, Digital Signatures, and Identity

This module explains how modern blockchain systems rely on public-key cryptography to authenticate users, secure assets, and establish decentralised trust. We explore key pairs, signatures, address generation, and the logic of cryptographic control in decentralised environments.

Conceptual illustration of public-key cryptography and digital signatures

Learning Outcomes

  • Understand public-key cryptography and how key pairs are generated.
  • Distinguish between encryption, signing, and verification.
  • Describe how blockchain addresses are derived from public keys.
  • Explain how digital signatures authenticate transactions.
  • Analyse the security model behind ownership and identity in blockchain systems.

1. Public-Key Cryptography

Public-key cryptography (also known as asymmetric cryptography) is foundational to decentralised systems. It uses a pair of mathematically related keys:

  • Private Key: Secret. Controls assets. Must never be revealed.
  • Public Key: Shared openly. Used to verify signatures.
Diagram showing private key, public key, and address derivation

Figure 1: Asymmetric key architecture used in blockchain identity.

Unlike symmetric-key systems, public-key cryptography enables verification without exposure. Anyone can verify a signature using your public key, without learning anything about the private key.

2. Key Generation

Keys are generated by selecting a random number (the private key) and applying an irreversible mathematical transformation to produce the public key. In Bitcoin and Ethereum:

  • Elliptic Curve Digital Signature Algorithm (ECDSA) is used.
  • The curve secp256k1 defines the mathematical structure.
  • The private key is simply a 256-bit random number.
Important:

The security of your blockchain identity depends entirely on the entropy (randomness) of the private key. Weak randomness compromises identity.

3. Digital Signatures

Digital signatures authenticate messages using a private key. They ensure:

  • Authenticity: The message was created by the private-key holder.
  • Integrity: The message was not modified.
  • Non-repudiation: The signer cannot deny having signed it.
Digital signature workflow diagram

In a blockchain transaction, a user signs the transaction data with their private key. Other nodes verify the signature using the public key, ensuring that only the true owner can spend or transfer assets.

4. Blockchain Addresses and Identity

Blockchain systems do not use conventional accounts tied to personal identity. Instead, identity emerges from:

  • The public key (or its hash).
  • A derived address.
  • The private key controlling authorisation.

No central authority verifies identity. Instead:

Identity = Control of the private key. Losing the private key → Losing access to assets permanently. Anyone controlling the private key → Controls the identity.

Identity derived from private key ownership

5. Signatures in Blockchain Transactions

Every blockchain transaction includes:

  • Transaction data (recipient, amount, nonce, etc.)
  • A digital signature
  • The public key or derived address

Validators in the network:

  • Verify the signature
  • Confirm the signer has the authority
  • Reject malformed or unauthorised transactions
Signature verification across nodes

This signature-based model allows trust to emerge collectively without a central authority.

6. Synthesis

Public-key cryptography transforms the problem of trust. Instead of relying on institutions to authenticate identity, blockchains rely on mathematics:

  1. The private key controls authorisation.
  2. The public key enables universal verification.
  3. Digital signatures authenticate actions.
  4. Addresses encode identity without personal information.

Cryptographic identity is foundational to all higher-level blockchain behaviour: transactions, smart contracts, wallets, governance, and more. In the next module, we explore how these identities coordinate in distributed networks through consensus mechanisms.

7. Key Terms

Private Key
A secret number used to sign transactions and control assets.
Public Key
A publicly shared value used to verify signatures.
Digital Signature
A cryptographic proof that a message was signed by the private key holder.
Address
A derived identifier used in blockchain transactions.
ECDSA
Elliptic Curve Digital Signature Algorithm — the signature scheme used in many blockchains.

8. Self-Check Quiz

  1. What is the relationship between a private key and a public key?
  2. How does a digital signature prove authenticity without revealing the private key?
  3. Why is losing the private key equivalent to losing identity?
  4. What prevents an attacker from guessing your private key?
  5. How do blockchain nodes verify signed transactions?

Pages: 1 2 3 4 5 6