Oddbean new post about | logout
 part of the purpose of doing that is the public key of a UTXO is not revealed until it's spent, this requires a different signature construction where you find the key by verifying the signature against the txid (hash) rather than having the key and verifying it validates against the signature (like bip-340 schnorr signatures)

essentially this means the cat is out of the bag before anyone knows who had the bag