How To Create a General Election With a Single Signature for All Votes: Meet Boneh–Lynn–Shacham (BLS) signatures
Building a More Trusted World
Introduction
What a completely untrusted Internet we have created, and where little in our digital world can be fully trusted. To overcome this we need to provide digital signatures in order to prove the integrity the data and of the entity that is signing. This often involves creating a hash of a message and then signing with our private key. The public key is then used to prove the signer.
Some applications, though, involve many signers signing for a transaction. This could relate to an on-line petition, and where Bob, Alice and Carol sign the petition with their private key, and then add their signature to the petition:
“We the undersigned believe that that there are too many cooks in the kitchen”0x546043654323 [Bob]0x646583654313 [Alice]0x344583854099 [Carol]
We can see we have three signatures, and which could be checked against the public key of…