Derivation
Private Key Derivation
After a stealth transaction is identified, the recipient must derive the private key needed to access the funds.
Steps
Compute Shared Secret
Use your viewing private key
vand the ephemeral public keyEto computeP' = v × E.Hash
P'to obtainh'.
Derive the Stealth Private Key
Let
sbe your spending private key.Compute the stealth private key:
s_stealth = s + h'.
Last updated
