
When you send crypto from a wallet, something specific happens before any node on the network will accept the transaction: it checks your signature. Not a username, not a password, not a government-issued ID. A cryptographic signature derived from a private key that only you hold.
Understanding this mechanism clarifies something that confuses a lot of new participants — the difference between owning crypto and controlling crypto. On a blockchain, ownership is a legal or social concept. Control is mathematical. The network only recognises the second one.
The fundamental challenge in any financial system is proving authorisation. When you tell your bank to transfer money, the bank verifies your identity through a combination of credentials, session tokens, and account-level access controls. The bank is the trusted intermediary that enforces the rule: only the account holder can move funds.
Blockchains have no such intermediary. There is no account manager, no customer service desk, no reversal mechanism. The question of "did the rightful owner authorise this?" must be answered by the network itself, using only the information contained in the transaction.
Digital signatures provide that answer. They allow you to prove, mathematically, that you hold the private key corresponding to an address — without ever revealing the key itself. Any node in the network can verify the signature, and the verification requires no trust in any third party.
The underlying cryptographic structure is asymmetric key cryptography. The system generates a pair of mathematically linked keys:
The critical property: knowing your address reveals nothing about your private key. Knowing your public key reveals nothing about your private key. The mathematics of elliptic curves makes the reverse computation equivalent to solving what's called the discrete logarithm problem — computationally intractable at current and near-future hardware capabilities.
Bitcoin and Ethereum both use the Elliptic Curve Digital Signature Algorithm (ECDSA) for transaction signing, though the specifics differ slightly by network.
Signing a transaction:
Verifying the transaction:
The signature is non-transferable between transactions. A signature that proves authorisation for one transaction hash cannot be repurposed to authorise a different transaction. Changing a single field in the transaction produces a completely different hash, invalidating the original signature.
The nonce requirement on Ethereum is a hard constraint tied to the signature mechanism. Transactions must be processed in strict nonce order. This prevents an attacker from rebroadcasting an old, valid signature with modified fields — the nonce ensures each transaction is unique and sequentially ordered.
The k-value problem in ECDSA: When generating a signature, the algorithm requires a random number k. If k is ever reused across two different signatures from the same private key, an attacker can algebraically extract the private key from those two signatures. This is not theoretical — early implementations that used poor random number generation had key compromises. Modern wallets use deterministic k generation (RFC 6979) to eliminate this risk.
Signature malleability was a historical constraint in Bitcoin. The ECDSA signature scheme allows mathematical manipulation of the s value that produces a different but equally valid signature for the same transaction. This created edge cases in transaction identification. Bitcoin's Segregated Witness (SegWit) upgrade addressed this by separating the signature data from the transaction identifier.
Replay protection: A signature valid on one chain would naively be valid on a forked chain using the same history. Ethereum EIP-155 addressed this by including the chain ID in the data being signed — a Bitcoin signature is not replayable on Ethereum, and an Ethereum mainnet signature is not replayable on a testnet.
The core ECDSA signing mechanism for user transactions is stable and not under active revision. Two structural developments are worth noting at the protocol level:
BLS signatures in Ethereum's validator layer: Ethereum validators already use BLS (Boneh-Lynn-Shacham) signatures rather than ECDSA. BLS signatures have a critical property ECDSA lacks: aggregation. Multiple validators' signatures on the same message can be mathematically combined into a single compact signature, dramatically reducing the data overhead of the validator coordination layer. This is already live for consensus — it is not yet the signing scheme for standard user transactions.
Account abstraction (EIP-7702 and related): Ethereum's account abstraction roadmap would allow smart contracts to define custom validation logic — including alternative signature schemes, multi-signature requirements, or time-locked authorisations. This does not break the current ECDSA model; it extends what's possible at the account layer for users who want it.
Post-quantum considerations: ECDSA's security depends on the hardness of the elliptic curve discrete logarithm problem. Sufficiently capable quantum computers running Shor's algorithm could theoretically break this. NIST has finalised post-quantum cryptographic standards. Blockchain migration to post-quantum signing schemes is a long-horizon, technically complex process — not an active threat in any near-term timeframe, but not ignorable as a multi-decade architectural consideration.
The current ECDSA model is functioning: no known ECDSA breaks exist at current key sizes, deterministic k generation is standard in production wallets, and replay protection is in place across major networks. Confirmation that BLS aggregation is working as designed is visible in Ethereum's consensus participation rates.
The signature model would require reassessment if: a practical attack on secp256k1 were demonstrated at cryptographic scale; a wallet implementation vulnerability exposed large numbers of private keys through nonce reuse or flawed randomness; or post-quantum hardware timelines accelerated substantially beyond current projections.
Now: ECDSA is live, stable, and the primary signing mechanism across Bitcoin and Ethereum. This is the mechanism to understand.
Next: BLS signature aggregation is already active in Ethereum's validator layer. EIP-7702 and account abstraction extensions are advancing — worth monitoring as they shift what's possible in smart contract wallets.
Later: Post-quantum migration is a long-horizon consideration. NIST standards are set. Blockchain-specific migration paths are unresolved. This is something to file, not act on.
This post explains the signature mechanism. It does not address the broader security model of any specific wallet product, nor does it constitute guidance on key management practices. The mechanism works as described — what that implies for your specific setup is outside this scope.
Understanding how signatures work clarifies why "not your keys, not your coins" has a precise technical meaning: the network only recognises authorisation from the holder of the private key. Custody is a question of who controls signing, not who holds a balance in a ledger somewhere.




