Adaptor Signatures
Cryptography● Common

A cryptographic technique where a signature is created in an 'incomplete' form that can only be completed by learning a secret value (the adaptor). Once the adapted signature is published, the secret is revealed. Enables atomic swaps, PTLCs, and other trustless protocols without hash preimages.

Technical Notes

For Schnorr: given adaptor point T = t·G, create adaptor signature s' = k + H(R+T,P,m)·x. Publisher completes as s = s' + t. Observer learns t = s - s'. Enables scriptless scripts where contract logic happens entirely off-chain.

Metadata

Visibility: Public
Created:1/3/2026by System

Actions