|
|
|
@ -606,7 +606,7 @@ that are believed to be secure.
|
|
|
|
|
Alice and Bob need to derive the public key for _x_, which is _xG_.
|
|
|
|
|
Since it's possible to use elliptic curve operations to add two EC
|
|
|
|
|
points together, they start by Alice deriving _yG_ and Bob deriving
|
|
|
|
|
_zG_. They then add them together to create _xG_ = _yG_ + _zG_. The point
|
|
|
|
|
_zG_. They then add them together to create [.keep-together]#_xG_ = _yG_ + _zG_.# The point
|
|
|
|
|
_xG_ is ((("aggregated public keys")))((("public keys", "aggregated")))their _aggregated public key_. To create a signature, they begin the
|
|
|
|
|
simple multisignature protocol:
|
|
|
|
|
|
|
|
|
|