|
|
|
@ -70,6 +70,7 @@ From the private key, we
|
|
|
|
|
use elliptic curve multiplication, a one-way cryptographic function, to
|
|
|
|
|
generate a public((("public key cryptography", startref="pub-key")))((("key pairs", startref="key-pair"))) key (_K_).
|
|
|
|
|
|
|
|
|
|
[role="less_space pagebreak-before"]
|
|
|
|
|
.Why Use Asymmetric Cryptography (Public/Private Keys)?
|
|
|
|
|
****
|
|
|
|
|
Why is ((("asymmetric cryptography", see="public key cryptography")))((("public key cryptography", "purpose in Bitcoin")))((("digital signatures")))asymmetric
|
|
|
|
|