Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Adaptor Signature

An adaptor signature is an encrypted cryptographic signature that can be transformed into a valid signature only after a specific secret value is revealed.
Chainscore © 2026
definition
CRYPTOGRAPHIC PRIMITIVE

What is an Adaptor Signature?

An adaptor signature is a cryptographic building block that enables conditional payments and atomic swaps by partially signing a transaction.

An adaptor signature is a cryptographic construction that acts as a verifiable, partial signature on a blockchain transaction, where the final valid signature can only be produced by revealing a secret piece of data, known as a witness. It is built upon standard digital signature schemes like Schnorr or ECDSA and is a core component of protocols for atomic swaps, Lightning Network payment channels, and discreet log contracts. The mechanism ensures that the act of completing a transaction automatically reveals the secret, which can then be used to trigger a dependent action in a separate transaction, guaranteeing atomicity.

The technical process involves a signer creating a signature that is encumbered by a cryptographic puzzle. This puzzle is derived from a public point T, which corresponds to a secret value t. The resulting adaptor signature is not valid on-chain but can be verified as a commitment to become valid. To finalize it, the holder of the secret t must provide it, which simultaneously completes the signature and discloses t. This revelation is the key to cross-chain atomic swaps: one party's completion of their transaction on Chain A reveals the secret, allowing the counterparty to claim funds on Chain B, with no risk of one side executing without the other.

Beyond simple swaps, adaptor signatures enable complex scriptless scripts, where the logic of a smart contract is executed off-chain through cryptographic proofs instead of on-chain opcodes. This increases privacy and efficiency. For example, in a Lightning Network channel, an HTLC (Hashed Timelock Contract) can be implemented using an adaptor signature, where the payment preimage is the secret t. The receiver can only claim the payment by revealing the preimage, which then allows the payer to claim funds on a connected route, all without exposing the contract conditions on the public ledger.

how-it-works
CRYPTOGRAPHIC PRIMITIVE

How Adaptor Signatures Work

An explanation of the cryptographic mechanism enabling conditional payments and atomic swaps without on-chain scripting.

An adaptor signature is a cryptographic proof that a valid digital signature for a transaction can be produced, but only if a specific piece of secret information, called a witness or adaptor secret, is revealed. It is a foundational building block for off-chain protocols like atomic swaps and payment channels, enabling conditional payments without requiring complex on-chain smart contract logic. The technique is also known as a scriptless script, as it embeds the condition for signature completion within the cryptography itself rather than in a visible script.

The core mechanism involves modifying a standard digital signature, such as a Schnorr or ECDSA signature, by 'adapting' it with a cryptographic commitment to the secret. This creates a pre-signature that appears random and is useless on its own. Crucially, the party verifying this adaptor signature can be confident that if the correct secret is ever published, a complete, valid signature for the agreed-upion transaction will be instantly derivable. This property is what enables atomicity: the act of claiming one transaction (by revealing the secret) automatically provides the necessary data to finalize a linked transaction.

A classic use case is a cross-chain atomic swap between Bitcoin and Litecoin. Alice creates an adaptor signature for a Bitcoin transaction payable to Bob, with the adaptor secret t. Bob can verify this signature but cannot claim the funds without t. Bob then creates a corresponding adaptor signature for a Litecoin transaction payable to Alice, using the same secret t. When Alice claims the Litecoin by revealing t in her signature, Bob learns t from the blockchain and can immediately use it to complete his adaptor signature and claim the Bitcoin. This ensures the swap either completes entirely for both parties or not at all.

Beyond atomic swaps, adaptor signatures are integral to Discreet Log Contracts (DLCs) and advanced Lightning Network constructions. In DLCs, oracles produce adaptor signatures that release funds based on real-world events, with the outcome-determining data serving as the adaptor secret. This allows for complex, trust-minimized derivatives and prediction markets. Their scriptless nature also offers significant privacy and scalability benefits over traditional hashed timelock contracts (HTLCs), as the conditional logic is not exposed on-chain, reducing blockchain footprint and improving fungibility.

key-features
ADAPTOR SIGNATURE

Key Features and Properties

Adaptor Signatures are cryptographic primitives that enable conditional spending and atomic swaps by embedding a secret within a digital signature.

01

Conditional Authorization

An adaptor signature is a partial signature that is cryptographically bound to a secret value. It allows a transaction to be authorized only if the secret is revealed. This creates a powerful conditional logic: the transaction can be broadcast, but it remains invalid until the secret is published, at which point the signature becomes complete and valid.

02

Atomic Swap Mechanism

This is the canonical use case. Two parties can swap assets atomically without a trusted third party:

  • Party A creates an adaptor signature for a transaction paying Party B, locking it with a secret.
  • Party B, upon seeing this, can create a valid transaction for Party A using the same cryptographic adaptor point.
  • When Party B claims their payment by broadcasting their transaction, they inadvertently reveal the secret.
  • Party A can then extract the secret and use it to finalize and broadcast their own transaction, completing the swap.
03

Discreet Log Contracts (DLCs)

Adaptor signatures are the core building block for Discreet Log Contracts. Oracles sign outcomes of real-world events (e.g., "BTC > $60K") using adaptor signatures. Each possible outcome is tied to a different secret. When the oracle reveals the signature for the actual outcome, it also reveals the secret, allowing the winning party to claim the contract funds without revealing the other, unchosen outcomes on-chain.

04

Scriptless Scripts

Adaptor signatures enable Scriptless Scripts, where complex smart contract logic (like multi-party conditions) is executed off-chain through cryptographic protocols instead of on-chain scripting languages. This improves privacy, as the contract terms are not visible on the public ledger, and can reduce transaction size and cost compared to traditional script-based solutions.

05

Cryptographic Foundation

Technically, an adaptor signature is built on Schnorr or ECDSA signatures. It involves:

  • A secret t and its public point T = t*G.
  • A partial signature s' that is verifiable against the public key plus the adaptor point T.
  • The complete, valid signature s is derived as s = s' + t. Knowledge of t allows anyone to convert the adaptor signature into a standard one.
06

Privacy & Efficiency

Compared to traditional hash-based atomic swaps or complex scripts, adaptor signatures offer significant advantages:

  • Enhanced Privacy: On-chain transactions appear standard; the conditional logic and swap details are hidden.
  • Reduced On-chain Footprint: The proof of the secret's revelation is embedded within a normal-looking signature, minimizing data usage.
  • Interoperability: The technique is agnostic to the underlying blockchain, enabling cross-chain swaps between any chains supporting the same elliptic curve cryptography.
examples
ADAPTOR SIGNATURE

Primary Use Cases and Examples

Adaptor signatures are cryptographic primitives enabling conditional payments and complex transaction logic without on-chain scripts. They are foundational for discreet log contracts (DLCs) and cross-chain atomic swaps.

02

Cross-Chain Atomic Swaps

Adaptor signatures enable atomic swaps between different blockchain protocols (e.g., Bitcoin and Litecoin) without a trusted third party.

  • Process: Party A locks funds in a transaction with an adaptor signature. To claim them, Party B must solve the adaptor, which reveals a secret. Party A then uses this revealed secret to claim the funds Party B locked on the other chain.
  • Guarantee: The swap is atomic—either both parties complete the trade, or neither does, eliminating counterparty risk.
04

Scriptless Scripts

Adaptor signatures are a key component of scriptless scripts, a concept for executing smart contract logic using pure cryptography instead of blockchain-specific opcodes.

  • Principle: Complex conditions (e.g., "sign only if you know secret X") are embedded directly into Schnorr/Taproot signatures, making the logic private and more efficient.
  • Benefit: This reduces on-chain footprint, increases privacy by making contracts indistinguishable from regular transactions, and improves scalability.
05

CoinSwap & Privacy Enhancements

Adaptor signatures facilitate CoinSwap protocols, which improve transactional privacy by breaking the on-chain link between sender and receiver.

  • Operation: Multiple parties cooperatively create a set of transactions locked with adaptor signatures. The completion of the swap reveals secrets in a way that obfuscates which outputs belong to which original owner.
  • Outcome: This creates a trustless, decentralized mixing service that is more private and robust than centralized tumblers or CoinJoin.
06

Verifiable Timed Signatures

This advanced use case combines adaptor signatures with time-locks to create signatures that only become valid after a certain time, or to prove a signature was prepared in advance.

  • Application: Useful for proof-of-liability protocols where an exchange must cryptographically prove its solvency without immediately moving funds, or for creating covenants with time-based conditions.
  • Mechanism: The adaptor secret is linked to the passage of time or a verifiable delay function (VDF), releasing control of funds only when the condition is met.
visual-explainer
MECHANISM

Visualizing the Adaptor Signature Flow

This section illustrates the step-by-step cryptographic protocol that enables conditional payments and atomic swaps using adaptor signatures.

An adaptor signature is a cryptographic primitive that encodes a secret within a digital signature, creating a conditional proof of authorization for a blockchain transaction. The flow begins when a prover, such as Alice, creates a partial signature for a transaction but withholds a cryptographic secret (the adaptor secret). She then sends this incomplete signature—the adaptor signature—to a verifier, Bob. Bob can verify that the signature is valid only if the hidden secret is revealed, but he cannot learn the secret or complete the signature himself. This creates a cryptographic lock on the transaction funds.

The protocol's core mechanism relies on a one-way relationship between the secret and the final signature. When Bob later receives the transaction on-chain, he observes the completed, valid signature. By comparing this final signature with the original adaptor signature he held, Bob can perform a simple mathematical operation to extract the adaptor secret. This property is known as witness extraction. The extracted secret often serves as the proof-of-payment or the key to unlock another transaction in a linked contract, enabling trustless cross-chain or cross-asset swaps.

A canonical example is an atomic swap between Bitcoin and Litecoin. Alice creates an adaptor signature for a Bitcoin transaction locked to a secret t. Bob creates a corresponding adaptor signature for a Litecoin transaction locked to the same secret. They exchange these conditional signatures. When Alice claims the Litecoin by revealing t in her signature, Bob immediately extracts t from the public blockchain data. He then uses t to complete his adaptor signature and claim the Bitcoin. This flow ensures either both transactions complete atomically or neither does, eliminating counterparty risk without a trusted third party.

Beyond swaps, this flow underpins Discreet Log Contracts (DLCs) and other advanced Bitcoin smart contracts. In a DLC, the adaptor secret represents the outcome of a real-world event (e.g., a sports score). Oracles produce a signature that reveals the outcome-specific secret, which allows the correct party to claim funds from a multi-signature address. The visualization of the adaptor signature flow—creation, verification, completion, and extraction—is fundamental to understanding how complex, conditional logic can be executed securely on blockchains that natively support only simple digital signatures.

ecosystem-usage
ADAPTOR SIGNATURE

Ecosystem Usage and Protocols

An adaptor signature is a cryptographic primitive enabling conditional payments and trustless cross-chain communication by embedding a secret within a digital signature.

01

Core Cryptographic Mechanism

An adaptor signature is a partial digital signature that commits to a hidden secret (a preimage or discrete logarithm). It is created by tweaking a standard Schnorr or ECDSA signature with this secret. The signature can only be completed by someone who knows the secret, revealing it upon completion. This creates a cryptographic proof-of-payment or proof-of-knowledge without requiring an on-chain transaction for the condition itself.

02

Discreet Log Contracts (DLCs)

A primary application of adaptor signatures is in Discreet Log Contracts (DLCs), enabling trustless blockchain oracles and complex financial derivatives.

  • How it works: A contract's outcome (e.g., "BTC > $60K") is encoded into adaptor signatures. The oracle, who learns the outcome off-chain, provides the secret to complete the correct signature, allowing only the winning party to claim the funds.
  • Key benefit: The contract terms and oracle data remain off-chain, ensuring privacy and scalability.
03

Atomic Swaps & Cross-Chain

Adaptor signatures are fundamental to atomic swaps between different blockchain protocols (e.g., Bitcoin and Litecoin).

  • Process: Party A creates a transaction locked with an adaptor signature, requiring a secret to claim. Party B can only learn this secret if they first complete a corresponding transaction on the other chain, also locked with the same secret.
  • Result: The swap either completes atomically across both chains or fails entirely, eliminating counterparty risk without a trusted intermediary.
04

Payment Channels & Lightning Network

Within payment channel networks like the Lightning Network, adaptor signatures enable Hash Time-Locked Contracts (HTLCs).

  • Function: An HTLC payment is a conditional payment locked by a hash preimage. The adaptor signature scheme allows the payment receiver to claim funds by revealing the preimage, which then automatically proves payment to intermediate routing nodes.
  • This mechanism is what enables secure, multi-hop payments across the network without trusting intermediaries.
05

Scriptless Scripts

Adaptor signatures are a key component of scriptless scripts, a concept for executing complex smart contract logic without placing the logic itself on-chain.

  • Principle: Instead of writing contract conditions in a blockchain's scripting language (e.g., Bitcoin Script), the conditions are encoded into the cryptographic relationships between signatures and secrets.
  • Advantages: This improves privacy (contract logic is invisible), reduces on-chain footprint, and can enhance fungibility by making transactions indistinguishable from regular payments.
06

Comparison to Hash Locks

Adaptor signatures are often compared to simpler hash locks (used in HTLCs).

  • Hash Lock: Locks funds with a hash H. Anyone who reveals the preimage R where hash(R) = H can claim the funds. The claim transaction reveals R on-chain.
  • Adaptor Signature: Locks funds cryptographically within a signature. The claim transaction is a standard signature that implicitly reveals the secret. This is more private and efficient, as the secret is not directly visible in the transaction data, only derivable by the involved parties.
security-considerations
ADAPTOR SIGNATURES

Security Considerations

While adaptor signatures enable powerful off-chain protocols, they introduce specific cryptographic and operational risks that must be managed.

01

Signature Malleability

A primary risk is signature malleability. If an adaptor signature is revealed before the final signature, a malicious party could modify it to create a different, valid signature. This could allow them to claim the on-chain funds without revealing the secret witness t, breaking the protocol's fairness. Implementations must use non-malleable signature schemes (like Schnorr in Bitcoin Taproot) and ensure the final signature is published atomically.

02

Witness Extraction & Privacy

The core security property is that completing an adaptor signature reveals the secret witness t. This enables protocols like atomic swaps. However, this also means:

  • Data Leakage: The extracted witness can reveal linkable information about the transaction's origin or purpose.
  • Timing Attacks: If the adaptor is published to a public mempool before the final signature, observers can learn t and front-run the settlement. Using point time-locked contracts (PTLCs) over hash time-locked contracts (HTLCs) can mitigate some privacy leaks.
03

Implementation Flaws

Errors in the cryptographic implementation can lead to catastrophic failures:

  • Invalid Curve Points: Using a non-secure or incorrectly generated encryption point can make the secret t trivial to extract.
  • Randomness Reuse: Reusing a nonce r across different adaptor signatures can leak private keys.
  • Protocol Logic Bugs: Flaws in the surrounding protocol (e.g., incorrect script conditions) can allow funds to be claimed without the correct adaptor completion. Rigorous auditing of the elliptic curve operations and protocol state machine is essential.
04

Denial-of-Service (DoS) Risks

Adaptor signature protocols are vulnerable to off-chain DoS attacks. A malicious participant can:

  • Generate and share a valid adaptor signature but then refuse to provide the final signature, leaving counterparty funds in a pending state.
  • Spam a peer with invalid or malformed adaptor signatures to waste computational resources. Protocols must incorporate timeouts, penalty transactions, and reputation systems to disincentivize this behavior.
05

Cross-Chain Protocol Risks

In cross-chain atomic swaps, adaptor signatures synchronize settlement across independent ledgers. This introduces asynchrony risks:

  • Blockchain Reorgs: A transaction revealing t on one chain could be reorganized, leaving the secret exposed but the contingent claim on the other chain invalid.
  • Congestion & Fee Spikes: High fees on one chain can prevent timely settlement, causing the entire swap to fail after secrets are revealed. These risks require careful fee management and sufficient time-lock buffers.
06

Key Management & Storage

The security of the adaptor signature protocol depends entirely on the security of the private keys used to generate them. Compromise of a signing key allows an attacker to:

  • Create fraudulent adaptor signatures.
  • Sign completion transactions without the correct witness, stealing funds.
  • Secure, offline key generation and hardware security module (HSM) storage for long-term keys are critical, especially in institutional or custody settings.
COMPARISON

Adaptor Signatures vs. Other Conditional Mechanisms

A technical comparison of cryptographic and smart contract-based methods for enforcing conditional payments.

FeatureAdaptor SignaturesHash Time-Locked Contracts (HTLCs)Smart Contracts (e.g., EVM)

Cryptographic Primitives

Schnorr/ECDSA signatures, Discrete Log

Hash functions (SHA-256), Timelocks

Turing-complete bytecode

On-Chain Footprint

Single signature (no conditional logic on-chain)

Revealed hash preimage, multiple transactions

Full contract deployment and state

Condition Type

Discrete log equivalence (knowledge of a secret)

Hash preimage revelation or timeout

Arbitrary, programmable logic

Privacy of Condition

High (condition is hidden until fulfillment)

Low (hash is public, reveals intent)

Low to Medium (logic is typically public)

Interoperability

Cross-chain (same curve, e.g., secp256k1)

Cross-chain (same hash function)

Chain-specific (within a single virtual machine)

Settlement Finality

Atomic (fulfillment is the settlement)

Atomic with timeout (can be forced)

Non-atomic (multiple steps, potential for disputes)

Typical Use Case

Atomic swaps, discreet log contracts

Lightning Network payments, cross-chain swaps

DeFi loans, conditional auctions, DAOs

Computational Overhead

Low (signature operations only)

Low (hash verification)

High (gas fees for execution and storage)

ADAPTOR SIGNATURES

Frequently Asked Questions (FAQ)

Adaptor signatures are a cryptographic primitive enabling conditional, off-chain payments and complex transaction logic. This FAQ addresses their core mechanics, applications, and relationship to other technologies.

An adaptor signature is a cryptographic proof that commits to a signature for a transaction, but only reveals the full, valid signature when a secret value (a cryptographic key) is disclosed. It works by creating a partial signature that is verifiably linked to a public key and a transaction, but is incomplete. The party who knows the corresponding secret key can complete the signature, thereby proving they possess the secret and simultaneously finalizing the transaction. This creates a powerful atomic conditional: the transaction can only be executed if the secret is revealed.

Key components:

  • Secret/Key (t): A random scalar value.
  • Adaptor Point (T): The public representation of the secret, T = t*G.
  • Partial Signature: A signature that is verifiable against the public key and the adaptor point T.
  • Completion: Adding the secret t to the partial signature yields the final, valid ECDSA or Schnorr signature for the blockchain.
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team