3.3 Data Sharing
- For encrypted data sharing, initialize additional data to zero.
- Acquire the opposing party's public key.
- Encrypt the data with the public key of the opposing party.
- Use your root private key to sign the data. This allows for the verification of your identity through the public key derived from your signature.
- Specify the HASH of the opposing party's public key.
- Upon decrypting the data, the receiver can validate the Hash256 of the plaintext.
Receiver's public key HASH, Plaintext Hash, Encrypted data, Owner's signature, 00 NOTE