# Accessing Privately Transferred Assets

After recognizing a transaction intended for her, Alice reconstructs the necessary private key to unlock the assets. This process relies solely on the ephemeral public key ePK. The steps are as follows:

1. Recalculate the shared secret using Alice’s viewing private key and the ephemeral public key ePK.
2. Derive the stealth private key stPrivK by integrating the shared secret with Alice’s spending private key:

[stPrivK=(spPrivK+S) mod n](#user-content-fn-1)[^1]

Where:

* spPrivK is Alice’s spending private key.
* n represents the order of the elliptic curve.
* s represents shared secret

Once stPrivK is derived, Alice can authenticate and retrieve the assets from the associated stealth address.

[^1]:


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.0x0.ai/0x0-ecosystem/arcane-privacy-wallet/accessing-privately-transferred-assets.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
