极米 (XGIMI) H1 微联智能 高清 家用 投影仪
百度 孙雨飞代表说,避免高技能人才“南飞”,为企业发展增加后续动力。
A public key is the public half of the public/private keypair. Anyone can use a public key check that a signature is correct, but they can't generate the signature themselves with the public key.
528 questions
1
vote
1
answer
210
views
Is it possible to recover a private key from an aggregate public key under strong assumptions?
Let's consider the following assumptions:
A computer can compute the private key from the public key in n years (with n being a small number, give or take). Of course, this assumption is highly ...
0
votes
0
answers
21
views
Derive addresses from Electrum master xpub
I am developing some code to derive addresses from different master public keys extracted from a series of wallets for some experiments I want to conduct. My code is currently able to work with most ...
0
votes
0
answers
146
views
How can I access my funds from the compressed private key (52 digits starting with k)?
I was using a web wallet from bitampcom, but now that site doesn't work properly and I can't login into my wallet.
I have a 52-digit private key that starts with k and L but I can't find any way to ...
1
vote
0
answers
42
views
How to create bitcoin keypair with mnemonic in JS
Hey i am just learning that how to create bit coin key pair using javascript.
I had tried many times but unable to create code. So can you help me with that?
This is the code for mnemonic generation.
...
0
votes
1
answer
53
views
When calculating the public key, what principle is used to take the even or odd y coordinate for x?
I don't understand the principle of selecting y coordinate from 2 possible options: even or odd
For example: priv key = 5 y even priv key=6 x even but y odd
Why?
I generate public keys on the site ...
0
votes
1
answer
31
views
Does this site calculate correctly?
I use Python program for calculations of public keys. Public keys with small values private keys match the ones on the site. But public keys with values private keys >10 don't match the ones on ...
0
votes
0
answers
108
views
How does the Related Key Attack on Schnorr Signatures work in real life?
We know that Schnorr signature is applied this way:
Key Generation
Define curve ( E ), field ( F_q ), order ( N ), generator ( G ), and hash ( h ).
Private key: ( d in (0, N) ), Public key: ( P = dG )...
2
votes
1
answer
578
views
Are there 2^160 possible addresses or 4*2^160 (4 address types) possible addresses?
Let's say Bob tells you to send him btc and he gives you a p2pkh address whose underlying 160-bit number is, say, 12345. You can't just convert that to the taproot representation of 12345 and send btc ...
0
votes
0
answers
72
views
PT2R and P2WSH Addresses from Public key hex
I'm trying to form addresses PT2R and P2WSH from Public key hex. Receiving this Public key hex from API like array of objects:
const data = [
{
staker_pk_hex: "...
2
votes
0
answers
113
views
UniSat's `getPublicKey` returns internal key or output key when using Taproot?
According to UniSat documentation here, I can call window.unisat.getPublicKey to get the public key of the current account.
My address type is Taproot. After calling this function, I get a compressed ...
2
votes
0
answers
90
views
Using BIP32 derivations, can all seeds theoretically produce all public keys?
I was interested in how many possible combinations of BIP 32 derivation paths exist, which could result in a public key derived from a seed. While some people colloquially call it "unlimited,&...
2
votes
1
answer
353
views
Did uncompressed public keys use the `04` prefix before compressed public keys were used?
Have uncompressed keys always used the 04 prefix, even before compressed keys (which use 02, 03) were used? Did bitcoin undergo an update to add these prefixes to the different key types? If so, since ...
1
vote
1
answer
276
views
How might you detect if two extended public keys have the same root private key?
Say I derive three extended public keys1 (normal mode):
Parent:
Pubkey: 035f743ee7d73d27e8c80f6b2458e6d4e2a45f3d7dd35c4e4d84ff3d939d09f40c
Chaincode ...
3
votes
1
answer
189
views
Does a P2PKH transaction send to the hash of the uncompressed key or the compressed key?
Simple question but I didn’t find a reference. Is it the compressed public key that is used or the uncompressed public key?? Or can it be both??
0
votes
1
answer
87
views
Is it possible to reduce the field size without disrupting generation of public keys?
I have a curious question, i am aware of the curve parameters of secp256k1. i was wondering if its possible to reduce to field to a 130 bit or lower without disrupting the actual functionality.. what ...