Posted by AdamISZ
Sep 15, 2025/18:38 UTC
The proposal in question revolves around a cryptographic method where Alice generates a new key for Bob, which she then communicates through an encrypted message using NIP-17. The core of the inquiry seeks a detailed breakdown of the equations underlying this mechanism, specifically asking for clarity on the structure of the notification and the precise format of the public key that Alice would pay to. The given formula, $P = B_{nostr} + H(aB_{nostr}|i)G$, suggests a complex interaction between various cryptographic elements, indicating that the public key ($P$) consists of Bob's nostril public key ($B_{nostr}$), modified by adding the hash of a multiplied nostril public key and an index ($i$), further combined with a generator point ($G$). This equation implies a layered security approach, blending hash functions with elliptic curve cryptography to ensure secure key exchanges.
Further, the inquiry touches upon operational specifics, such as the strategy for avoiding the need for scanning by Bob. It hints at a system where Bob maintains a batch of addresses for Alice, enabling him to monitor transactions without direct scanning, which could potentially streamline the process for Bob by reducing the computational overhead typically associated with address monitoring in cryptographic systems.
The email indicates a deep interest in understanding the structural intricacies of the proposed cryptographic solution from a theoretical standpoint. The sender expresses a clear preference for dissecting the proposal's mathematical and cryptographic framework over evaluating its practical applicability or design choices. This focus underscores a desire to grasp the underlying principles and the efficiency of the proposed scheme purely from a crypto-analytical perspective.
TLDR
We’ll email you summaries of the latest discussions from high signal bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project.
Give Feedback