Accessing Privately Transferred Assets

After recognizing a transaction intended for her, Alice reconstructs the necessary private key to unlock the assets. This process relies solely on the ephemeral public key ePK. The steps are as follows:

  1. Recalculate the shared secret using Aliceโ€™s viewing private key and the ephemeral public key ePK.

  2. Derive the stealth private key stPrivK by integrating the shared secret with Aliceโ€™s spending private key:

Where:

  • spPrivK is Aliceโ€™s spending private key.

  • n represents the order of the elliptic curve.

Once stPrivK is derived, Alice can authenticate and retrieve the assets from the associated stealth address.

Last updated