Рет қаралды 68
Web 3 Tech Series for corporate execs & board directors looking to get up to speed on the ENGINEERING aspects of web 3 technologies in the most time efficient way. Sign up for email alerts, updates and more detailed discussions here: hubel-labs.com...
In the last video about asymmetric encryptions / public key cryptography, we discussed how Alice and Bob can use secret keys and public keys to establish the identical keys that they need for secure two-way communication channel.
In this video, we discuss how public keys and secret keys can also be used in the "reversed" for digital signatures. To prove that the person holding the secret key has endorsed a certain document.