mirror of
https://github.com/bitcoin/bips.git
synced 2025-03-13 11:09:16 +01:00
Update wording
This commit is contained in:
parent
fb18d17106
commit
947916e5ba
1 changed files with 2 additions and 2 deletions
|
@ -35,7 +35,7 @@ A recipient that wishes to receive funds privately has several options. Each has
|
|||
|
||||
==Method==
|
||||
|
||||
When Alice wants to start paying Bob in private, she imports his payment code into a compatible wallet. Her wallet extracts Bob's public key from the payment code, constructs a notification transaction and sends it to a static address that all users of this BIP watch. If Bob finds a notification transaction addressed to himself, he imports Alice's public key contained therein and stores it. Bob then performs ECDH using Alice's public key and his own private key in order to calculate a common set of addresses to watch. Alice calculates the same set of addresses on her end and uses them to send coins to Bob. If Alice engages in coin control, both the initial notification transaction and subsequent payment transactions cannot be attributed to either party. Even if Alice uses coins that are already associated with her, chain analysis will identify her as a sender but Bob's privacy will remain entirely preserved.
|
||||
When Alice wants to start paying Bob in private, she imports his payment code into a compatible wallet. Her wallet extracts Bob's public key from the payment code and sends a notification transaction. If Bob finds a notification transaction addressed to himself, he imports Alice's public key contained therein and stores it. Bob then performs ECDH using Alice's public key and his own private key in order to calculate a common set of addresses to watch. Alice calculates the same set of addresses on her end and uses them to send coins to Bob. If Alice engages in coin control, both the initial notification transaction and subsequent payment transactions cannot be attributed to either party. Even if Alice uses coins that are already associated with her, chain analysis will identify her as a sender but Bob's privacy will remain entirely preserved.
|
||||
|
||||
==Specification==
|
||||
|
||||
|
@ -103,7 +103,7 @@ While payment codes use 2-byte bitflag arrays, notifications use ordinal values
|
|||
|
||||
===Notifications===
|
||||
|
||||
Notifications are performed by publishing transactions that contain a single 72-byte <code>OP_RETURN</code> output. The value of the <code>OP_RETURN</code> is constructed using the following formula:
|
||||
Notifications are performed by publishing transactions that contain a 72-byte <code>OP_RETURN</code> output. The value of the <code>OP_RETURN</code> is constructed using the following formula:
|
||||
|
||||
''search_key | notification_code | N<sub>x</sub> | address_type''
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue