Accessing Privately Transferred Assets
After recognizing a transaction intended for her, Alice reconstructs the necessary private key to unlock the assets. This process relies solely on the ephemeral public key ePK. The steps are as follows:
Recalculate the shared secret using Aliceโs viewing private key and the ephemeral public key ePK.
Derive the stealth private key stPrivK by integrating the shared secret with Aliceโs spending private key:
Where:
spPrivK is Aliceโs spending private key.
n represents the order of the elliptic curve.
Once stPrivK is derived, Alice can authenticate and retrieve the assets from the associated stealth address.
Last updated