top of page

Public Key

The asymmetric cryptography method is based on the use of two different keys to encrypt and decrypt information. These are a public and a private key.

The public key can be viewed by everyone and serves as the address for the respective participant. In Bitcoin, the public key is converted to the Bitcoin address by using two algorithms [1].

The public key is calculated with the formula K= k * G . K is the public key, k the private key and G is a constant point (generator point). The relationship between the private and public key is fixed, but the calculation only works in one direction. Therefore, it is not possible to conclude to the private key by only knowing the public key [1].


Because the public key is public, it can be used for a digital signature. It is possible for anyone to verify the sender of a message encrypted with the corresponding private key. Thus, trust and security can be generated in a Blockchain without a central control [2].



[1] Antonopoulos, A. (2015): Mastering Bitcoin Unlocking Digital Cryptocurrencies

[2] Heines, R. (2017): Blockchain Technology Applications: A Conceptual Framework from a Supply Chain Perspective

Begriff im Definitionsnetz

Begriff im Definitionsnetz

public key.png
bottom of page