🧠 Lamport Signatures Explained (Visually)
Post-quantum signatures built from hash functions. No elliptic curves. No math tricks. Just... hashes.
Let’s break it down visually 👇
🧾 Step-by-Step Walkthrough
1. We want to sign a 256-bit message
2. Generate 256 pairs of secret random numbers
3. Hash each secret to get the public key
4. Hash the message
5. Reveal secrets depending on message bits
6. The revealed secrets form the signature
✅ How to Verify
1. Hash each revealed secret
2. Compare with the public key
3. If all match, it's valid
⚠️ Limitation: One-Time Use
💭 Why is this quantum-safe?
📌 What’s Next?
Follow @Bitcoin_Devs for the next post on the "The Burn vs Steal Dilemma"