02 - Decentralizing Identity: Public Key Cryptography

The first step in creating a peer-to-peer trust protocol system is to digitally confirm one’s identity using mathematic principles. This video discusses how we use public key cryptography to do just that.

This introductory material also appears in our Blockchain Essentials course. While we will be going into much deeper technical detail, this is meant to give you an overview of the public key cryptography.