Photo by Element5 Digital on Unsplash

How To Create a General Election With a Single Signature for All Votes: Meet Boneh–Lynn–Shacham (BLS) signatures

Building a More Trusted World

--

Introduction

What a completely untrusted Internet we have created, and where little in our digital world can be fully trusted. To overcome this we need to provide digital signatures in order to prove the integrity the data and of the entity that is signing. This often involves creating a hash of a message and then signing with our private key. The public key is then used to prove the signer.

Some applications, though, involve many signers signing for a transaction. This could relate to an on-line petition, and where Bob, Alice and Carol sign the petition with their private key, and then add their signature to the petition:

“We the undersigned believe that that there are too many cooks in the kitchen”0x546043654323 [Bob]0x646583654313 [Alice]0x344583854099 [Carol]

We can see we have three signatures, and which could be checked against the public key of…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.