L2hjTJNhjpUTdAVMArh3UqmnTXEVx6J6Faui8cUXCPpyQMUEkJ54
A user can create a public key by performing an operation with the private key. Typically, we do another operation on the public key to get a public address. This is what you hand out to other users when you want them to send funds to you.
If you sign a message (i.e., a transaction) using your private key, others can use your corresponding public key to verify its authenticity. They use your public key to check if the message was really signed by you, and to ensure it wasn't altered after that.
Note that itâs necessary (and perfectly safe) to share your public key with others. But you should never reveal your private key. If someone gets access to it, theyâll be able to spend your funds by signing transactions on your behalf.
æå·è³ç£ã«é¢ãããã©ã³ã¶ã¯ã·ã§ã³æ å ±ãæç³»åã§èšé²ããåæ£åããžã¿ã«å°åž³ã
æå·åæè¡ã«ããä¿è·ããããã¢ã»ããŒã»ãã¢ïŒP2PïŒçµæžã·ã¹ãã å ã§ã®äº€æåªäœãšããŠæ©èœããããžã¿ã«é貚ã
æ°åŠççè«ãšèšç®ãçšããŠæ å ±ãæå·åããã³åŸ©å·åãè¡ãç§åŠåéã