Buy Event Ticket Consensus MIami 2026 - 20% Paris Blockchain Week - 15% OFF

What is Public Key

A public key is the publicly shareable component of an asymmetric cryptographic key pair  derived mathematically from your private key through a one-way function that cannot be reversed. In cryptocurrency, public keys play a central role in verifying transaction authenticity and are the basis from which wallet addresses are derived.

THE ASYMMETRIC KEY PAIRA

symmetric cryptography (public-key cryptography) uses mathematically related key pairs where: the private key is secret, known only to you, and is used to sign (create) cryptographic proofs, and the public key is derived from the private key and can be shared freely  it is used by others to verify that a signature was made by the holder of the corresponding private key. The critical mathematical property: it is computationally infeasible to derive the private key from the public key. This one-way relationship is the foundation of all blockchain security.

FROM PRIVATE KEY TO PUBLIC KEY: THE MATH

Bitcoin and Ethereum use elliptic curve cryptography (ECC) over the secp256k1 curve. A private key is a random 256-bit integer. The corresponding public key is produced by multiplying the private key by a fixed generator point G on the elliptic curve: Public Key = Private Key × G. Elliptic curve multiplication is a trapdoor function  easy in one direction (computing public from private), computationally impossible in reverse (recovering private from public).

FROM PUBLIC KEY TO WALLET ADDRESS

For privacy and security, wallet addresses are not the raw public key but a hash of it: 

  1. Bitcoin: address = Base58Check(version + RIPEMD160(SHA256(public key))). 

  2. Ethereum: address = last 20 bytes of Keccak256(public key), prefixed with 0x. 

This additional hashing layer provides an extra security buffer against potential future weaknesses in elliptic curve cryptography.

PUBLIC KEY IN TRANSACTION VERIFICATION

When verifying a Bitcoin or Ethereum transaction: the verifier has the transaction data, the digital signature, and the sender's public key. Using the ECDSA verification algorithm with the public key, they confirm mathematically that the signature was produced by the holder of the corresponding private key  without ever seeing or needing the private key itself.

Terms in addition to the Public Key

Scroll to Top