Skip to main content

3.3 Data Sharing

  1. For encrypted data sharing, initialize additional data to zero.
  2. Acquire the opposing party's public key.
  3. Encrypt the data with the public key of the opposing party.
  4. Use your root private key to sign the data. This allows for the verification of your identity through the public key derived from your signature.
  5. Specify the HASH of the opposing party's public key.
  6. Upon decrypting the data, the receiver can validate the Hash256 of the plaintext.
Receiver's public key HASH, Plaintext Hash, Encrypted data, Owner's signature, 00 NOTE