Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 12
Generated: 06:53:51
Login to reply

Replies (12)

The magic of ECDH is possible because a person's Public key (eg: NPUB) is their Private key multiplied by the curve base point G. It's a calculation that simple to do, but pretty much impossible to reverse engineer. In other words, you can easily calculate a public key (P) given its private key (p), but crucially, you can't calculate a private key from the public key! image
2025-11-24 21:01:07 from 1 relay(s) โ†‘ Parent 1 replies โ†“ Reply
She then calculates a "shared secret" by point-multiplying her ephemeral private key (e) with Bob's public key (P). This gives a shared point (known as "Z"). Here's the magic... this shared point (Z) is the SAME as if she had multiplied her private key (e), Bob's private key (p) and the cryptographic Generator point (G). But she calculated it using Bob's PUBLIC key. image
2025-11-24 21:02:26 from 1 relay(s) โ†‘ Parent 1 replies โ†“ Reply
The beauty of P2BK is that it provides perfect privacy. Alice and Bob do not need to communicate at all to set it up - all Alice needs is Bob's public key. The ecash is locked to totally unique blinded public key(s), keeping the receiver's identity private from anyone who views the ecash. This means tokens can be published securely in public. The sender's identity is also protected, because Alice uses an ephemeral keypair to create the shared secret, and throws it away afterwards. All Bob needs is the ephemeral Public Key! image
2025-11-24 21:03:49 from 1 relay(s) โ†‘ Parent 1 replies โ†“ Reply