What is ring-signatures?
Hiding the signer in a crowd.
Hiding the signer in a crowd.
graph LR
Center["What is ring-signatures?"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Pre_digital_signatures["digital-signatures"]:::pre --> Center
click Pre_digital_signatures "/terms/digital-signatures"
Pre_public_key_cryptography["public-key-cryptography"]:::pre --> Center
click Pre_public_key_cryptography "/terms/public-key-cryptography"
Rel_zero_knowledge_proof["zero-knowledge-proof"]:::related -.-> Center
click Rel_zero_knowledge_proof "/terms/zero-knowledge-proof"
Rel_multi_sig["multi-sig"]:::related -.-> Center
click Rel_multi_sig "/terms/multi-sig"
Rel_private_key["private-key"]:::related -.-> Center
click Rel_private_key "/terms/private-key"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explique como se eu tivesse 5 anos
🤝 It's like a group of people all wearing the same mask. You know one of them performed the action, but you can't tell which one.
🤓 Expert Deep Dive
## Technical Deep Dive: Linkable Ring Signatures
### The Key Image
A key image is a cryptographic tag derived from the signer's private key. For every transaction, there is exactly one valid key image. If a user tries to spend the same money twice, they will produce the same key image both times, allowing the network to reject the second transaction without knowing the user's identity.
### Decoy Selection
In Monero, the 'ring size' (currently 16) determines how many decoys are used. Effective privacy requires a 'decoy selection algorithm' that picks decoys that look like real transactions (e.g., using a Gamma distribution to favor newer outputs), preventing 'EAE' (Eve-Alice-Eve) attacks.