Derivation

Private Key Derivation

After a stealth transaction is identified, the recipient must derive the private key needed to access the funds.

Steps

  1. Compute Shared Secret

    • Use your viewing private key v and the ephemeral public key E to compute P' = v × E.

    • Hash P' to obtain h'.

  2. Derive the Stealth Private Key

    • Let s be your spending private key.

    • Compute the stealth private key: s_stealth = s + h'.

Last updated