Remove "key tuple" abstraction.

Signed-off-by: Daira Hopwood <daira@jacaranda.org>
This commit is contained in:
Daira Hopwood 2017-02-23 20:05:10 +00:00
parent f565d642b4
commit cfe4d4bd09
1 changed files with 7 additions and 10 deletions

View File

@ -370,7 +370,6 @@ electronic commerce and payment, financial privacy, proof of work, zero knowledg
\newcommand{\payingKey}{\term{paying key}}
\newcommand{\transmissionKey}{\term{transmission key}}
\newcommand{\transmissionKeys}{\term{transmission keys}}
\newcommand{\keyTuple}{\term{key tuple}}
\newcommand{\notePlaintext}{\term{note plaintext}}
\newcommand{\notePlaintexts}{\term{note plaintexts}}
\newcommand{\NotePlaintexts}{\titleterm{Note Plaintexts}}
@ -1206,19 +1205,17 @@ $\PoWMaxAdjustUp$ will also be defined in that section.
}
\sproutonly{
A \keyTuple $(\AuthPrivate, \TransmitPrivate, \PaymentAddress)$ is
generated by users who wish to receive payments under this scheme.
Users who wish to receive payments under this scheme first generate a
random \spendingKey $\AuthPrivate$.
The \receivingKey $\TransmitPrivate$, the \viewingKey
$\ViewingKey = (\AuthPublic, \TransmitPrivate)$, and the \paymentAddress
$\PaymentAddress = (\AuthPublic, \TransmitPublic)$ are derived from the
\spendingKey $\AuthPrivate$.
$\PaymentAddress = (\AuthPublic, \TransmitPublic)$ are derived from
$\AuthPrivate$, as described in \crossref{keycomponents}.
}
\sproutonly{
The following diagram depicts the relations between key components.
Arrows point from a component to any other component(s) that can be derived
from it.
}
\begin{center}
\includegraphics[scale=.7]{key_components}
@ -2434,9 +2431,9 @@ In order to transmit the secret $\Value$, $\NoteAddressRand$, and $\NoteCommitRa
(necessary for the recipient to later spend) \changed{and also a \memo} to the
recipient \emph{without} requiring an out-of-band communication channel, the
\transmissionKey $\TransmitPublic$ is used to encrypt these
secrets. The recipient's possession of the associated \keyTuple
$(\AuthPrivate, \TransmitPrivate, \PaymentAddress)$ is used to reconstruct
the original \note \changed{ and \memo}.
secrets. The recipient's possession of the associated \viewingKey
$(\AuthPublic, \TransmitPrivate)$ is used to reconstruct the original \note
\changed{ and \memo}.
All of the resulting ciphertexts are combined to form a \notesCiphertext.