Chuen, David Lee Kuo, ed. Handbook of digital currency: Bitcoin, innovation, financial instruments, and big data. Academic Press, 2015.
Existing Citations
private key (p.21): … Bitcoin … uses an asymmetrical algorithm that generates two separate but asymmetrically linked keys: a public key and a private key. The keys are asymmetrical in the sense that the public key is derived from the private key but it is computationally impossible to obtain a private key from a public key. … The private key, on the other hand, must be kept secret and safely. (†2386)
public key (p.21): Bitcoin … uses an asymmetrical algorithm that generates two separate but asymmetrically linked keys: a public key and a private key. The keys are asymmetrical in the sense that the public key is derived from the private key but it is computationally impossible to obtain a private key from a public key. … The public key is publicly accessible; in Bitcoin, it is used as the Bitcoin address to and from which payments are sent. (†2385)
public key cryptography (p.21): Central to Bitcoin technology is public-key cryptography, which with the SHA-256 hash function is used to generate Bitcoin addresses, sign transactions, and verify payments. Public-key cryptography is a technique of reliably determining the authenticity of Bitcoin transactions using digital signatures. It uses an asymmetrical algorithm that generates two separate but asymmetrically linked keys: a public key and a private key. The keys are asymmetrical in the sense that the public key is derived from the private key but it is computationally impossible to obtain a private key from a public key. (†2384)