File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -174,7 +174,7 @@ Note: this procedure is used if Bob uses a version 1 payment code (regardless of
174
174
## Bob selects the designated pubkey: <pre>A, where A = aG</pre>
175
175
## Bob selects the private key associated with his notification address: <pre>b</pre>
176
176
## Bob calculates a secret point: <pre>S = bA</pre>
177
- ## Bob calculates the binding factor: <pre>s = HMAC-SHA512(x, o)</pre>
177
+ ## Bob calculates the blinding factor: <pre>s = HMAC-SHA512(x, o)</pre>
178
178
### "x" is the x value of the secret point
179
179
### "o" is the outpoint being spent by the designated input.
180
180
## Bob interprets the 80 byte payload as a payment code, except:
@@ -218,7 +218,7 @@ The following actions are recommended to reduce this risk:
218
218
219
219
====Sending ====
220
220
221
- # Each time Alice wants to initiate a transaction to Bob, Alice derives a unique P2PKH address for the transaction using ECDH follows:
221
+ # Each time Alice wants to initiate a transaction to Bob, Alice derives a unique P2PKH address for the transaction using ECDH as follows:
222
222
## Alice selects the 0th private key derived from her payment code: <pre>a</pre>
223
223
## Alice selects the next unused public key derived from Bob's payment code, starting from zero: <pre>B, where B = bG</pre>
224
224
### The "next unused" public key is based on an index specific to the Alice-Bob context, not global to either Alice or Bob
You can’t perform that action at this time.
0 commit comments