Skip to content

Commit e992a0b

Browse files
committed
steal -> stealth
1 parent f4e4e2b commit e992a0b

File tree

1 file changed

+1
-1
lines changed
  • public/content/developers/tutorials/stealth-addr

1 file changed

+1
-1
lines changed

public/content/developers/tutorials/stealth-addr/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Standard stealth addresses use [elliptic-curve cryptography (ECC)](https://blog.
3333

3434
There is a number everybody knows, *G*. You can multiply by *G*. But because of the nature of ECC, it is practically impossible to divide by *G*. The way public key cryptography generally works in Ethereum is that you can use a private key, *P<sub>priv</sub>*, to sign transactions that are then verified by a public key, *P<sub>pub</sub> = GP<sub>priv</sub>*.
3535

36-
Alice creates two private keys, *K<sub>priv</sub>* and *V<sub>priv</sub>*. *K<sub>priv</sub>* will be used to spend money out of the steal address, and *V<sub>priv</sub>* to view the addresses that belong to Alice. Alice then publishes the public keys: *K<sub>pub</sub> = GK<sub>priv</sub>* and *V<sub>pub</sub> = GV<sub>priv</sub>*
36+
Alice creates two private keys, *K<sub>priv</sub>* and *V<sub>priv</sub>*. *K<sub>priv</sub>* will be used to spend money out of the stealth address, and *V<sub>priv</sub>* to view the addresses that belong to Alice. Alice then publishes the public keys: *K<sub>pub</sub> = GK<sub>priv</sub>* and *V<sub>pub</sub> = GV<sub>priv</sub>*
3737

3838
Bill creates a third private key, *R<sub>priv</sub>*, and publishes *R<sub>pub</sub> = GR<sub>priv</sub>* to a central registry (Bill could also have sent it to Alice, but we assume Carol is listening).
3939

0 commit comments

Comments
 (0)