From ba535a6803f49a5c33c741c2aa5bd0207913e39a Mon Sep 17 00:00:00 2001 From: claylock Date: Thu, 26 Oct 2023 17:53:05 +0000 Subject: [PATCH] Edited ch08_signatures.adoc with Atlas code editor --- ch08_signatures.adoc | 1 + 1 file changed, 1 insertion(+) diff --git a/ch08_signatures.adoc b/ch08_signatures.adoc index 30ddacd8..29b86175 100644 --- a/ch08_signatures.adoc +++ b/ch08_signatures.adoc @@ -340,6 +340,7 @@ exactly as it's used in Bitcoin, but we're going to start with a simplified version of it and work our way toward the actual protocol in stages. +[role="less_space pagebreak-before"] Alice((("digital signatures", "schnorr signature algorithm", "examples of usage")))((("schnorr signature algorithm", "examples of usage"))) starts by choosing a large random number (_x_), which we call her _private key_. She also knows a public point on Bitcoin's elliptic curve called the Generator (_G_) (see <>). Alice uses EC