Book Image

Solidity Programming Essentials. - Second Edition

By : Ritesh Modi
Book Image

Solidity Programming Essentials. - Second Edition

By: Ritesh Modi

Overview of this book

Solidity is a high-level language for writing smart contracts, and the syntax has large similarities with JavaScript, thereby making it easier for developers to learn, design, compile, and deploy smart contracts on large blockchain ecosystems including Ethereum and Polygon among others. This book guides you in understanding Solidity programming from scratch. The book starts with step-by-step instructions for the installation of multiple tools and private blockchain, along with foundational concepts such as variables, data types, and programming constructs. You’ll then explore contracts based on an object-oriented paradigm, including the usage of constructors, interfaces, libraries, and abstract contracts. The following chapters help you get to grips with testing and debugging smart contracts. As you advance, you’ll learn about advanced concepts like assembly programming, advanced interfaces, usage of recovery, and error handling using try-catch blocks. You’ll also explore multiple design patterns for smart contracts alongside developing secure smart contracts, as well as gain a solid understanding of writing upgradable smart concepts and data modeling. Finally, you’ll discover how to create your own ERC20 and NFT tokens from scratch. By the end of this book, you will be able to write, deploy, and test smart contracts in Ethereum.
Table of Contents (21 chapters)
1
Part 1: The Fundamentals of Solidity and Ethereum
7
Part 2: Writing Robust Smart Contracts
13
Part 3: Advanced Smart Contracts

Recovering addresses using ecrecover

Solidity provides a very powerful function known as ecrecover, which is used to derive the address of a sender based on the digital signature.

The concept of digital certificates was covered in Chapter 1, Introduction to Blockchain, Ethereum, and Smart Contracts. In summary, digital signatures help in identifying the sender of a message. The message is hashed and encrypted using the private key of the sender, known only to the sender. Anyone decrypting the message using the corresponding public key can be assured that it is originating from the holder of the private key.

There are situations when it is necessary to verify the sender of a message using the signature itself. It is especially useful in scenarios involving self-sovereign identities, decentralized exchanges, and off-chain computations.

Ethereum cryptography is based on the Elliptic Curve Digital Signature Algorithm (ECDSA), and the ecrecover function helps in recovering the...