📢 Exclusive on Gate Square — #PROVE Creative Contest# is Now Live!
CandyDrop × Succinct (PROVE) — Trade to share 200,000 PROVE 👉 https://www.gate.com/announcements/article/46469
Futures Lucky Draw Challenge: Guaranteed 1 PROVE Airdrop per User 👉 https://www.gate.com/announcements/article/46491
🎁 Endless creativity · Rewards keep coming — Post to share 300 PROVE!
📅 Event PeriodAugust 12, 2025, 04:00 – August 17, 2025, 16:00 UTC
📌 How to Participate
1.Publish original content on Gate Square related to PROVE or the above activities (minimum 100 words; any format: analysis, tutorial, creativ
Adapter signature technology enables Bitcoin and Layer2 cross-chain atomic swaps.
Adapter Signatures and Their Application in Cross-Chain Atomic Swaps
With the rapid development of Bitcoin Layer 2 scaling solutions, the frequency of cross-chain asset transfers between Bitcoin and its Layer 2 networks has significantly increased. This trend is driven by the higher scalability, lower transaction fees, and high throughput provided by Layer 2 technology, facilitating broader adoption and integration of Bitcoin across various applications. As a result, interoperability between Bitcoin and Layer 2 networks is becoming a key component of the cryptocurrency ecosystem, driving innovation and providing users with more diverse and powerful financial tools.
There are mainly three solutions for cross-chain transactions between Bitcoin and Layer 2: centralized cross-chain trading, BitVM cross-chain bridge, and cross-chain atomic swaps. These three technologies have their characteristics in terms of trust assumptions, security, convenience, and transaction limits, which can meet different application needs.
Cross-chain atomic swaps are contracts that enable decentralized cryptocurrency trading. "Atomic" means that a change in ownership of one asset effectively means a change in ownership of another asset. This concept was first introduced in 2013 on the Bitcointalk forum, and in 2017, Decred and Litecoin successfully completed atomic swaps for the first time. Atomic swaps must involve two parties, and no third party can interrupt or interfere with the swapping process. This means that the technology is decentralized, censorship-resistant, provides better privacy protection, and can achieve high-frequency cross-chain trading, thus being widely adopted in decentralized exchanges.
Currently, cross-chain atomic swaps mainly include two technologies: hash time-locked ( HTLC ) and adapter signature-based swaps. Adapter signature-based atomic swaps have the following advantages over HTLC atomic swaps:
This article introduces the principles of Schnorr/ECDSA adapter signatures and cross-chain atomic swaps, analyzes the security issues of random numbers in adapter signatures and the problems of system heterogeneity and algorithm heterogeneity in cross-chain scenarios, and provides corresponding solutions. Finally, it expands the application of adapter signatures to achieve non-interactive digital asset custody.
Adapter Signatures and Cross-Chain Atomic Swaps
Schnorr adapter signature and atomic swap
The atomic swap process for Schnorr adapter signatures is as follows:
ECDSA adapter signature and atomic swap
The atomic swap process of ECDSA adapter signatures is as follows:
Questions and Solutions
Random Number Problem and Solutions
There are security issues in the adapter signature related to random number leakage and reuse, which may lead to private key exposure. The solution is to use RFC 6979, to deterministically derive the random number k from the private key and the message:
k = SHA256(sk, msg, counter)
This ensures that k is unique for each message while providing reproducibility for the same input, reducing the risk of private key exposure associated with weak random number generators.
cross-chain scenario issues and solutions
The heterogeneous issue between UTXO and account model systems: Bitcoin uses the UTXO model, while the Ethereum system uses the account model. In the Ethereum system, since the nonce cannot be predicted, refund transactions cannot be pre-signed. The solution is to use smart contracts on the Bitlayer side to achieve atomic swaps, but this will sacrifice some privacy.
Security of adapter signatures with the same curve and different algorithms: If both Bitcoin and Bitlayer use the Secp256k1 curve, but Bitcoin uses Schnorr signatures while Bitlayer uses ECDSA, the adapter signature in this case is provably secure.
Different curve adapter signatures are not secure: If Bitcoin uses the Secp256k1 curve and ECDSA signatures, while Bitlayer uses the ed25519 curve and Schnorr signatures, then adapter signatures cannot be used due to different curve parameters resulting in different modulus coefficients.
Digital Asset Custody Application
Non-interactive threshold digital asset custody can be achieved based on adapter signatures, and the main steps are as follows:
This scheme has non-interactive advantages compared to threshold Schnorr signatures, but has lower flexibility. Verifiable encryption is the key cryptographic primitive for implementing this scheme, with two main implementations: Purify and Juggling.
Adapter signatures provide a decentralized, efficient, and privacy-preserving solution for cross-chain asset exchanges between Bitcoin and Layer 2 networks. By addressing the random number security issue and the heterogeneous problems in cross-chain scenarios, adapter signatures can play an important role in practical applications, promoting the development of the Bitcoin ecosystem.