Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 1
Generated: 08:04:00
Now Bob can use the magic of ECDH... he takes his private key (p) and the ephemeral public key that Alice sent with the ecash (E), and he can calculate the SAME shared secret! He can now use that shared secret to derive a private key to unlock the ecash. image
2025-11-24 21:03:22 from 1 relay(s) ↑ Parent 1 replies ↓
Login to reply

Replies (1)

The beauty of P2BK is that it provides perfect privacy. Alice and Bob do not need to communicate at all to set it up - all Alice needs is Bob's public key. The ecash is locked to totally unique blinded public key(s), keeping the receiver's identity private from anyone who views the ecash. This means tokens can be published securely in public. The sender's identity is also protected, because Alice uses an ephemeral keypair to create the shared secret, and throws it away afterwards. All Bob needs is the ephemeral Public Key! image
2025-11-24 21:03:49 from 1 relay(s) ↑ Parent 1 replies ↓ Reply