{"id":37324,"date":"2020-05-02T11:00:20","date_gmt":"2020-05-02T08:00:20","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=37324"},"modified":"2025-08-29T15:18:30","modified_gmt":"2025-08-29T12:18:30","slug":"what-is-a-multisignature-what-is-a-ring-signature","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/what-is-a-multisignature-what-is-a-ring-signature\/","title":{"rendered":"What is a multisignature? What is a ring signature?"},"content":{"rendered":"<div id=\"cards_wrapper\">\n<div class=\"single_card\">\n<p id=\"card_counter_1\" class=\"card_counter\"><span class=\"card_counter_span\">1<\/span><\/p>\n<p><strong>What is a multisignature?<\/strong><\/p>\n<div class=\"card_description\">\n<p>A multisignature (multisignature or multisig) is a technique for authorising transactions with multiple private keys, raising security and privacy during the approval of outgoing transfers.<\/p>\n<p>A multisignature is a form of <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9F%D0%BE%D1%80%D0%BE%D0%B3%D0%BE%D0%B2%D0%B0%D1%8F_%D0%BF%D0%BE%D0%B4%D0%BF%D0%B8%D1%81%D1%8C\" target=\"_blank\" rel=\"noopener noreferrer\">threshold signature<\/a>, implemented as a verification of conditions expressed in the cryptocurrency\u2019s base scripting language.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_2\" class=\"card_counter\"><span class=\"card_counter_span\">2<\/span><\/p>\n<p><strong>How and when did multisignatures emerge? <\/strong><\/p>\n<div class=\"card_description\">\n<p>Although the technology is widespread in cryptocurrencies, its fundamentals long predate bitcoin.<\/p>\n<p>For centuries a multisig-like principle was used to protect monastery vaults or crypts that held holy relics. An abbot distributed parts of the keys among monks. No monk could access the relics alone and steal them.<\/p>\n<p>Multisignature support was first implemented for Bitcoin addresses in 2012. The first wallet with multisig functionality was <a href=\"https:\/\/medium.com\/@willobrien\/its-time-to-end-the-cold-storage-ice-age-and-adopt-multi-sig-8589733c9fd6\" target=\"_blank\" rel=\"noopener noreferrer\">created<\/a> in 2013. Today there are more than a dozen.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_3\" class=\"card_counter\"><span class=\"card_counter_span\">3<\/span><\/p>\n<p><strong>How do multisignatures work? <\/strong><\/p>\n<div class=\"card_description\">\n<p>Access to funds in a multisig wallet is possible only when two or more signatures are presented concurrently.<\/p>\n<p>A simple analogy is a safe-deposit box with two locks and two keys. Maria holds one key, Juan the other. They can open the box only if they present both keys at the same time. Neither can open it unilaterally without the other\u2019s consent.<\/p>\n<p>Thus, multisig wallets add an extra layer of security. The approach helps users avoid problems typical of single-key wallets, which represent a single point of failure and are vulnerable to cybercriminals\u2019 constantly evolving phishing tactics.<\/p>\n<p>Because spending requires more than one signature, multisig also suits businesses and corporations that want to keep funds in shared wallets.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_4\" class=\"card_counter\"><span class=\"card_counter_span\">4<\/span><\/p>\n<p><strong>What kinds of multisignature setups exist? <\/strong><\/p>\n<div class=\"card_description\">\n<p>1-of-2: a joint account of two business partners \u2014 either party\u2019s signature suffices to spend funds.<\/p>\n<p>2-of-2: a joint savings account of two business partners \u2014 both signatures are required, preventing one owner from spending without the other\u2019s approval.<\/p>\n<p>2-of-2: a wallet with two-factor authentication \u2014 one key is stored on a computer, the other on a smartphone. Funds cannot be spent without signatures from both devices.<\/p>\n<p>3-of-5: a low-trust donations address \u2014 each of five trusted project participants holds a private key. Any three can spend funds, while anyone can donate to the project\u2019s address. This arrangement reduces the risk of embezzlement, hacks, malware and loss caused by a participant losing interest. The blockchain records which private key was used for the final signature, improving accounting.<\/p>\n<p>2-of-3: a buyer\u2013seller escrow without trust \u2014 the buyer sends funds to a 2-of-3 address, the seller acts as the third arbiter.<\/p>\n<p>If the transaction succeeds, buyer and seller both sign, releasing funds to the seller. If it fails, they can co-sign a refund to the buyer.<\/p>\n<p>If they cannot agree, both turn to the third party, which acts as arbiter and provides the second signature to the side it deems deserving. The arbiter cannot steal the funds because it holds only one key.<\/p>\n<p>2-of-3: a council of three custodians holds a company\u2019s or organisation\u2019s funds \u2014 spending requires consent from any two of the three. Larger organisations can use bigger multisig setups \u2014 3-of-5, 5-of-9, and so on.<\/p>\n<p>2-of-3: a hot wallet for businesses. A bitcoin exchange keeps one private key online and another as a paper backup. A separate cybersecurity company holds the third key online and signs only after checking several factors (black\/white lists, withdrawal limits over a period, two-factor authentication, regulatory compliance, etc.). If the exchange\u2019s hot wallet is hacked, bitcoins cannot be stolen. If the security firm ceases operations, the exchange can access funds via the paper backup.<\/p>\n<p>2-of-3: a decentralised cold-storage vault \u2014 one key is kept by the user in a home safe, the second in a bank deposit box, and a copy of the third key is held by a close friend or relative at their office. The home safe is protected from burglars because spending requires a visit to the friend, the bank or the office.<\/p>\n<p>2-of-2: smart contracts \u2014 TumbleBit, <a href=\"https:\/\/en.bitcoin.it\/wiki\/CoinSwap\" target=\"_blank\" rel=\"noopener noreferrer\">Coinswap<\/a>, Lightning Network.<\/p>\n<p>1 or 3-of-4: distributed recovery \u2014 the primary user can spend at will, but if they lose their private keys, access can be restored with three of four other trusted friends\/organisations. One key is stored in a bank deposit box, the other three with friends. In the event of the owner\u2019s death, the vault with funds can, under a will, be transferred to a trusted friend or someone who can obtain assistance from the trusted friends.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_5\" class=\"card_counter\"><span class=\"card_counter_span\">5<\/span><\/p>\n<p><strong>What are ring signatures?<\/strong><\/p>\n<div class=\"card_description\">\n<p>A ring signature is a type of cryptographic digital signature that can be produced by any member of a group of users, each of whom holds a key.<\/p>\n<p>One security property is that it is computationally infeasible to determine which member\u2019s key was used to sign. Ring signatures resemble <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%93%D1%80%D1%83%D0%BF%D0%BF%D0%BE%D0%B2%D0%B0%D1%8F_%D0%BF%D0%BE%D0%B4%D0%BF%D0%B8%D1%81%D1%8C\" target=\"_blank\" rel=\"noopener noreferrer\">group signatures<\/a> but differ in two ways: an individual signature cannot be deanonymised, and any members of any user group can act as signers without extra setup.<\/p>\n<p>The term \u201cring signature\u201d comes from the ring-like structure of the signature-generation algorithm.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_6\" class=\"card_counter\"><span class=\"card_counter_span\">6<\/span><\/p>\n<p><strong>Who invented ring signatures, and when? <\/strong><\/p>\n<div class=\"card_description\">\n<p>Ring signatures were invented by cryptographers <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-crypto%e2%80%91anarchism\">Ron Rivest<\/a>, Adi Shamir and Yael Tauman Kalai and were <a href=\"https:\/\/link.springer.com\/chapter\/10.1007%2F3-540-45682-1_32\" target=\"_blank\" rel=\"noopener noreferrer\">presented<\/a> at the ASIACRYPT international conference in 2001.<\/p>\n<p>The original concept envisaged ring signatures as a way to protect against leaks of classified information, notably from government offices. The initial model was later refined.<\/p>\n<p>In 2006 Eiichiro Fujisaki and Kotaro Suzuki proposed <a href=\"https:\/\/eprint.iacr.org\/2006\/389.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Traceable Ring Signatures<\/a>, addressing a vulnerability in ring signatures (the risk of manipulation by malicious or irresponsible signers). An optimised version of this variant is used in CryptoNote coins today, providing sender untraceability in P2P transactions by hiding the source of inputs.<\/p>\n<p>In 2015 Monero Research Labs advanced the idea of ring confidential transactions (<a href=\"https:\/\/eprint.iacr.org\/2015\/1098.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Ring Confidential Transactions<\/a>), which Bitcoin Core developer Gregory Maxwell presented and implemented. Extending the anonymisation of basic ring signatures, ring confidential transactions hide not only the sender\u2019s identity but also the amounts exchanged between sender and recipient.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_7\" class=\"card_counter\"><span class=\"card_counter_span\">7<\/span><\/p>\n<p><strong>How do ring signatures work? <\/strong><\/p>\n<div class=\"card_description\">\n<p>Ring signatures take the idea of group signatures a step further, offering greater privacy. In P2P transaction formats used by cryptocurrencies such as <a href=\"https:\/\/cryptonote.org\/whitepaper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">CryptoNote<\/a>, ring signatures protect the sender by obscuring the receiving side of the transaction so that it is computationally infeasible to determine who signed it.<\/p>\n<p>Ring signatures are more sophisticated than typical digital signatures such as ECDSA or Schnorr signatures.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/TZFVFjnEdsw\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Ring signatures may require many different public keys for verification. The term \u201cring\u201d reflects that a ring signature comprises a set of partial digital signatures from different users. Together these signatures form a unique signature. The set is known as a ring and can be chosen arbitrarily from other users\u2019 outputs on the <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-blockchain-2\">blockchain<\/a>.<\/p>\n<p>Conceptually, ring signatures resemble several parties signing a cheque from a joint bank account, except that cryptography hides which group member actually signed.<\/p>\n<p>Structure of a ring signature (using <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-monero-xmr\">Monero<\/a> as an example):<\/p>\n<ul>\n<li>Alice wants to send Bob 10 <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-monero-xmr\">Monero<\/a> tokens and initiates a transaction via her Monero wallet.<\/li>\n<li>The digital signature for this transaction is a one-time key that begins with the output spent from her wallet.<\/li>\n<li>The non-signers in the ring are past transaction outputs, randomly selected from the blockchain, which serve as decoys.<\/li>\n<li>All members of the chain are possible signers \u2014 a third party cannot, by computation, determine the actual signer.<\/li>\n<li>All outputs in the ring collectively form the transaction input.<\/li>\n<li>The transaction creator, Alice, can provably spend the amount in such a way that her identity is indistinguishable from that of other ring members.<\/li>\n<li>Although Alice\u2019s public key is used in her own transaction, it may, at will, be used as a masking factor in other transactions on the <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-monero-xmr\">Monero<\/a> network.<\/li>\n<\/ul>\n<p>The automatic creation of unique one-time keys prevents linkability of transactions and is enabled by an optimisation of key exchange via the <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9F%D1%80%D0%BE%D1%82%D0%BE%D0%BA%D0%BE%D0%BB_%D0%94%D0%B8%D1%84%D1%84%D0%B8_%E2%80%94_%D0%A5%D0%B5%D0%BB%D0%BB%D0%BC%D0%B0%D0%BD%D0%B0\" target=\"_blank\" rel=\"noopener noreferrer\">Diffie\u2013Hellman method<\/a>.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_8\" class=\"card_counter\"><span class=\"card_counter_span\">8<\/span><\/p>\n<p><strong>What is a key image? <\/strong><\/p>\n<div class=\"card_description\">\n<p>Privacy-focused currencies such as <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-monero-xmr\">Monero<\/a> face the double-spend problem. Without a solution these networks would be useless as digital money, hence the use of key images in combination with ring signatures.<\/p>\n<p>A key image is a cryptographic key derived from a spent output and forms part of every ring-signature transaction. There is only one unique key image for each output on the <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-blockchain-2\">blockchain<\/a>. The list of all used key images is stored on-chain.<\/p>\n<p>Because of their cryptographic properties, key images cannot be correlated with their originating outputs. Any new ring signatures that use a duplicate key image are automatically rejected as attempted double-spends.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_9\" class=\"card_counter\"><span class=\"card_counter_span\">9<\/span><\/p>\n<p><strong>What are ring confidential transactions (RingCT)? <\/strong><\/p>\n<div class=\"card_description\">\n<p>RingCT is an enhanced modification of ring signatures. Whereas ring signatures primarily protect the sender\u2019s privacy, ring confidential transactions were designed to improve privacy for both sender and recipient by concealing the transaction amount.<\/p>\n<p>In the original ring-signature format, outputs were \u201csplit\u201d into separate rings because ring signatures could include only outputs of equal value. As a result, third parties could see true transaction amounts. With RingCT, transactions are recorded not in a transparent blockchain such as Bitcoin\u2019s, but in an \u201cobscured\u201d one.<\/p>\n<p>Transactions using RingCT no longer need to be broken up and placed into rings of equal-value outputs \u2014 a RingCT-enabled wallet can pick ring members at random from outputs of any size.<\/p>\n<p>RingCT also uses a commitment scheme implemented through a range proof, which verifies that the amount used in a transaction is greater than 0 and less than some upper bound, without revealing the amounts. External observers cannot see the sums yet, thanks to cryptographic verification, can be confident the transaction is valid.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<div class=\"card_description\">\n<p>Subscribe to Forklog on <a href=\"https:\/\/www.youtube.com\/channel\/UCC9FnXTC8_ENzaNSO5cHQ6g\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> YouTube<\/a>!<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1 What is a multisignature? A multisignature (multisignature or multisig) is a technique for authorising transactions with multiple private keys to improve security and privacy. It is a type of threshold signature implemented through conditions in a cryptocurrency\u2019s scripting language. 2 How and when did multisignatures emerge? Although widely used in cryptocurrencies, the underlying principles long predate bitcoin.<\/p>\n","protected":false},"author":1,"featured_media":37325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"2","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[2113],"tags":[2120,2115,1142],"class_list":["post-37324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptorium","tag-101-anonymity","tag-101-technical-foundations","tag-cryptography"],"aioseo_notices":[],"amp_enabled":true,"views":"129","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/37324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=37324"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/37324\/revisions"}],"predecessor-version":[{"id":37326,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/37324\/revisions\/37326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/37325"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=37324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=37324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=37324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}