mirror of
https://github.com/lnbook/lnbook
synced 2024-11-01 03:20:53 +00:00
changed typo for note box
This commit is contained in:
parent
e7ea4257c9
commit
7e88bfb010
@ -544,15 +544,13 @@ This process is of filler generation as well as the process of derriving the emp
|
|||||||
What is important to know is that every hope can derive the Ephemeral Public key that is necessary for the next hop and that the onions save space by always storing only one ephemeral key instead of all the keys for all the hops.
|
What is important to know is that every hope can derive the Ephemeral Public key that is necessary for the next hop and that the onions save space by always storing only one ephemeral key instead of all the keys for all the hops.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Finally after Alice has computed the encrypted version for Wei she will use the exact same process to compute the encrypted version for Bob.
|
Finally after Alice has computed the encrypted version for Wei she will use the exact same process to compute the encrypted version for Bob.
|
||||||
For Bobs onion she actually computes the header and provides the emphemeral public key herself.
|
For Bobs onion she actually computes the header and provides the emphemeral public key herself.
|
||||||
Note how Wei was still supposed to forward 3000 satoshis but How Bob was supposed to forward a different amount.
|
Note how Wei was still supposed to forward 3000 satoshis but How Bob was supposed to forward a different amount.
|
||||||
The difference is the routing fee for Wai.
|
The difference is the routing fee for Wai.
|
||||||
Bob on the other hand will only forward the onion if the difference between the mount to forward and the HTLC that Alice sets up while transfering the Onion to him is large enough to cover for the fees that he would like to earn.
|
Bob on the other hand will only forward the onion if the difference between the mount to forward and the HTLC that Alice sets up while transfering the Onion to him is large enough to cover for the fees that he would like to earn.
|
||||||
|
|
||||||
[NOTE]
|
[Note]
|
||||||
====
|
====
|
||||||
We have not discussed the exact cryptographic algorithms and schemes that are being used to compute the cypthertext from the plain text.
|
We have not discussed the exact cryptographic algorithms and schemes that are being used to compute the cypthertext from the plain text.
|
||||||
Also we have not discussed how the HMACs are being computed at every step and how everything fits together while the Onions are always being trucated and modified on the outer layer.
|
Also we have not discussed how the HMACs are being computed at every step and how everything fits together while the Onions are always being trucated and modified on the outer layer.
|
||||||
|
Loading…
Reference in New Issue
Block a user