📢 Gate Square Exclusive: #WXTM Creative Contest# Is Now Live!
Celebrate CandyDrop Round 59 featuring MinoTari (WXTM) — compete for a 70,000 WXTM prize pool!
🎯 About MinoTari (WXTM)
Tari is a Rust-based blockchain protocol centered around digital assets.
It empowers creators to build new types of digital experiences and narratives.
With Tari, digitally scarce assets—like collectibles or in-game items—unlock new business opportunities for creators.
🎨 Event Period:
Aug 7, 2025, 09:00 – Aug 12, 2025, 16:00 (UTC)
📌 How to Participate:
Post original content on Gate Square related to WXTM or its
Adapter Signature: A new Cryptography tool for cross-chain atomic swaps
Adapter Signatures and Their Application in Cross-Chain Atomic Swaps
With the rapid development of Bitcoin Layer2 scaling solutions, the frequency of cross-chain asset transfers between Bitcoin and Layer2 networks has significantly increased. This trend is driven by the higher scalability, lower transaction fees, and high throughput provided by Layer2 technology. The interoperability between Bitcoin and Layer2 networks is becoming a key component of the cryptocurrency ecosystem, fostering innovation and providing users with more diverse and powerful financial tools.
There are three main solutions for cross-chain transactions between Bitcoin and Layer 2: centralized cross-chain trading, BitVM cross-chain bridge, and cross-chain atomic swaps. These technologies differ in terms of trust assumptions, security, convenience, transaction limits, etc., and can meet various application needs.
This article focuses on the cross-chain atomic swap technology based on adapter signatures. Compared to the atomic swap based on hash time lock (HTLC), the adapter signature scheme has the following advantages:
Adapter Signatures and Cross-Chain Atomic Swaps
Schnorr adapter signature and atomic swap
The pre-signing process for Schnorr adapter signatures is as follows:
Verification process:
Final Signature: s = s' - y
ECDSA adapter signing and atomic swap
The pre-signing process for ECDSA adapter signatures is as follows:
Verification process:
Final Signature: s = s' - y
Questions and Solutions
Random Number Problem and Solutions
There is a security risk of random number leakage and reuse in the adapter signature, which may lead to private key exposure. The solution is to use RFC 6979 to generate random numbers in a deterministic manner:
k = SHA256(sk, msg, counter)
cross-chain scenarios issues and solutions
The heterogeneous problem between UTXO and account model systems: Bitcoin uses the UTXO model, while Ethereum and others use the account model, which makes it impossible to pre-sign refund transactions. The solution is to implement exchange logic using smart contracts on the account model chain.
Adapter signatures with the same curve but different algorithms are secure. For example, Bitcoin uses Schnorr signatures, while Bitlayer uses ECDSA signatures, and adapter signatures can still be used securely.
The adapter signatures for different curves are insecure due to the differing orders of the elliptic curve groups.
Digital Asset Custody Application
Non-interactive threshold digital asset custody can be achieved based on adapter signatures:
Verifiable encryption can be achieved through the Purify or Juggling schemes.
Adapter signatures provide more efficient and secure cryptographic tools for applications such as cross-chain atomic swaps and digital asset custody. However, in practical applications, issues such as random number security and system heterogeneity still need to be considered, and appropriate solutions should be chosen based on specific scenarios.