Questions tagged [ecdh]
4 questions
5
votes
3 answers
What is BIP32-style derivation?
I am reading the technical "specification" for stealth addresses, available here. The core idea is described in the following paragraph:
Using Elliptic curve Diffie-Hellman (ECDH) we can generate a shared
secret that the payee can use to recover…
Randomblue
- 783
- 8
- 18
4
votes
1 answer
Can ECDH peers waste each other's time at will?
Peter Dettman notes that ECDH peers can waste each other's time at will. What does he mean? Can this be weaponized against Lightning nodes?
Janus Troelsen
- 899
- 8
- 26
3
votes
1 answer
Sending confidential transaction amount to the receiver
In confidential transaction proposed by Maxwell, instead of transaction amounts we use pedersen commitments to hide the amount and add the range proof to the transaction to prevent overflow. A simple commitment with one input and one output C1 and…
abeikverdi
- 854
- 8
- 21
1
vote
1 answer
Why is BIP32 not simply PublicKey multiplication?
I understand that:
pubkey(a + b) = pubkey(a).combine(pubkey(b))
where a and b are secret keys. (See: https://crypto.stackexchange.com/q/83694/17505)
If, under the circumstances:
Bob wants to pay Alice, by creating transaction output whose private…
fadedbee
- 143
- 4