After a stealth transaction is identified, the recipient must derive the private key needed to access the funds.
Compute Shared Secret
Use your viewing private key v and the ephemeral public key E to compute P' = v × E.
v
E
P' = v × E
Hash P' to obtain h'.
P'
h'
Derive the Stealth Private Key
Let s be your spending private key.
s
Compute the stealth private key: s_stealth = s + h'.
s_stealth = s + h'
Last updated 11 months ago