From 7e88bfb01013dd686add4bc745fd586c5bcb2886 Mon Sep 17 00:00:00 2001 From: Rene Pichardt Date: Sat, 13 Jun 2020 22:24:12 +0200 Subject: [PATCH] changed typo for note box --- routing.asciidoc | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/routing.asciidoc b/routing.asciidoc index 02a33cb..c5a53ce 100644 --- a/routing.asciidoc +++ b/routing.asciidoc @@ -544,15 +544,13 @@ This process is of filler generation as well as the process of derriving the emp What is important to know is that every hope can derive the Ephemeral Public key that is necessary for the next hop and that the onions save space by always storing only one ephemeral key instead of all the keys for all the hops. - - Finally after Alice has computed the encrypted version for Wei she will use the exact same process to compute the encrypted version for Bob. For Bobs onion she actually computes the header and provides the emphemeral public key herself. Note how Wei was still supposed to forward 3000 satoshis but How Bob was supposed to forward a different amount. The difference is the routing fee for Wai. Bob on the other hand will only forward the onion if the difference between the mount to forward and the HTLC that Alice sets up while transfering the Onion to him is large enough to cover for the fees that he would like to earn. -[NOTE] +[Note] ==== We have not discussed the exact cryptographic algorithms and schemes that are being used to compute the cypthertext from the plain text. Also we have not discussed how the HMACs are being computed at every step and how everything fits together while the Onions are always being trucated and modified on the outer layer.