mirror of
https://github.com/nostr-protocol/nips.git
synced 2024-12-30 11:55:51 -05:00
BIP-32 link fix
This commit is contained in:
parent
83480de077
commit
3a36457c60
8
41.md
8
41.md
|
@ -46,14 +46,14 @@ The following abbreviations are used:
|
||||||
|
|
||||||
- `SK` secret key (32 bytes)
|
- `SK` secret key (32 bytes)
|
||||||
- `PK` public key
|
- `PK` public key
|
||||||
- `ESK` extended secret key, consisting of private key part (32 bytes) and 'chain code' part (32 bytes), as defined in (BIP-32)[https://bips.xyz/32].
|
- `ESK` extended secret key, consisting of private key part (32 bytes) and 'chain code' part (32 bytes), as defined in [BIP-32](https://bips.xyz/32).
|
||||||
- `EPK` extended public key, consisting of public key part (33 bytes) and 'chain code' part (32 bytes), as defined in (BIP-32)[https://bips.xyz/32].
|
- `EPK` extended public key, consisting of public key part (33 bytes) and 'chain code' part (32 bytes), as defined in [BIP-32](https://bips.xyz/32).
|
||||||
- `CC` is the chain code (hidden part of the extended key; term from BIP-32)
|
- `CC` is the chain code (hidden part of the extended key; term from BIP-32)
|
||||||
|
|
||||||
|
|
||||||
## Implementation
|
## Implementation
|
||||||
|
|
||||||
Generation of keys uses key derivation used by Bitcoin (BIP-32 'Hierarchically Deterministic')[https://bips.xyz/32] wallets.
|
Generation of keys uses key derivation used by Bitcoin [BIP-32 'Hierarchically Deterministic'](https://bips.xyz/32) wallets.
|
||||||
|
|
||||||
Verification operates on public keys only, taking use of the BIP-32 property that a public key derived from the corresponding public key of an extended private key is the same as the one corresponding to the derived private key.
|
Verification operates on public keys only, taking use of the BIP-32 property that a public key derived from the corresponding public key of an extended private key is the same as the one corresponding to the derived private key.
|
||||||
|
|
||||||
|
@ -62,7 +62,7 @@ Verification operates on public keys only, taking use of the BIP-32 property tha
|
||||||
|
|
||||||
This is intended to be run on safe and trusted hardware.
|
This is intended to be run on safe and trusted hardware.
|
||||||
|
|
||||||
A (BIP-32)[https://bips.xyz/32] seed is generated by any means (probably using BIP-39 words is the best idea).
|
A [BIP-32](https://bips.xyz/32) seed is generated by any means (probably using BIP-39 words is the best idea).
|
||||||
The extended private keys are then derived iteratively:
|
The extended private keys are then derived iteratively:
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
Loading…
Reference in New Issue
Block a user