Questions tagged [ecdh]

4 questions
5
votes
3 answers

What is BIP32-style derivation?

I am reading the technical "specification" for stealth addresses, available here. The core idea is described in the following paragraph: Using Elliptic curve Diffie-Hellman (ECDH) we can generate a shared secret that the payee can use to recover…
Randomblue
  • 783
  • 8
  • 18
4
votes
1 answer

Can ECDH peers waste each other's time at will?

Peter Dettman notes that ECDH peers can waste each other's time at will. What does he mean? Can this be weaponized against Lightning nodes?
Janus Troelsen
  • 899
  • 8
  • 26
3
votes
1 answer

Sending confidential transaction amount to the receiver

In confidential transaction proposed by Maxwell, instead of transaction amounts we use pedersen commitments to hide the amount and add the range proof to the transaction to prevent overflow. A simple commitment with one input and one output C1 and…
abeikverdi
  • 854
  • 8
  • 21
1
vote
1 answer

Why is BIP32 not simply PublicKey multiplication?

I understand that: pubkey(a + b) = pubkey(a).combine(pubkey(b)) where a and b are secret keys. (See: https://crypto.stackexchange.com/q/83694/17505) If, under the circumstances: Bob wants to pay Alice, by creating transaction output whose private…
fadedbee
  • 143
  • 4