What is ring-signatures?

Hiding the signer in a crowd.

Conteúdo pendente de tradução. Exibindo a versão em inglês.

Hiding the signer in a crowd.

        graph LR
  Center["What is ring-signatures?"]:::main
  Pre_cryptography["cryptography"]:::pre --> Center
  click Pre_cryptography "/terms/cryptography"
  Pre_digital_signatures["digital-signatures"]:::pre --> Center
  click Pre_digital_signatures "/terms/digital-signatures"
  Pre_public_key_cryptography["public-key-cryptography"]:::pre --> Center
  click Pre_public_key_cryptography "/terms/public-key-cryptography"
  Rel_zero_knowledge_proof["zero-knowledge-proof"]:::related -.-> Center
  click Rel_zero_knowledge_proof "/terms/zero-knowledge-proof"
  Rel_multi_sig["multi-sig"]:::related -.-> Center
  click Rel_multi_sig "/terms/multi-sig"
  Rel_private_key["private-key"]:::related -.-> Center
  click Rel_private_key "/terms/private-key"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explique como se eu tivesse 5 anos

🤝 It's like a group of people all wearing the same mask. You know one of them performed the action, but you can't tell which one.

🤓 Expert Deep Dive

## Technical Deep Dive: Linkable Ring Signatures

### The Key Image
A key image is a cryptographic tag derived from the signer's private key. For every transaction, there is exactly one valid key image. If a user tries to spend the same money twice, they will produce the same key image both times, allowing the network to reject the second transaction without knowing the user's identity.

### Decoy Selection
In Monero, the 'ring size' (currently 16) determines how many decoys are used. Effective privacy requires a 'decoy selection algorithm' that picks decoys that look like real transactions (e.g., using a Gamma distribution to favor newer outputs), preventing 'EAE' (Eve-Alice-Eve) attacks.

🔗 Termos relacionados

📚 Fontes