Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 1
Generated: 08:04:56
Login to reply

Replies (1)

She then calculates a "shared secret" by point-multiplying her ephemeral private key (e) with Bob's public key (P). This gives a shared point (known as "Z"). Here's the magic... this shared point (Z) is the SAME as if she had multiplied her private key (e), Bob's private key (p) and the cryptographic Generator point (G). But she calculated it using Bob's PUBLIC key. image
2025-11-24 21:02:26 from 1 relay(s) ↑ Parent 1 replies ↓ Reply