From fef2f454e7fa82ce68942b34d654e330ec83b633 Mon Sep 17 00:00:00 2001 From: clenser Date: Thu, 19 Oct 2023 12:59:29 +0000 Subject: [PATCH] Edited ch08_signatures.adoc with Atlas code editor --- ch08_signatures.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ch08_signatures.adoc b/ch08_signatures.adoc index 2623d6f5..ac90bb7e 100644 --- a/ch08_signatures.adoc +++ b/ch08_signatures.adoc @@ -338,7 +338,7 @@ exactly as it's used in Bitcoin, but we're going to start with a simplified version of it and work our way toward the actual protocol in stages. -Alice starts by choosing a large random number (+x+), which we call her +Alice((("digital signatures", "schnorr signature algorithm", "examples of usage")))((("schnorr signature algorithm", "examples of usage"))) starts by choosing a large random number (+x+), which we call her _private key_. She also knows a public point on Bitcoin's elliptic curve called the Generator (+G+) (see <>). Alice uses EC multiplication to multiply +G+ by her private key +x+, in which case +x+