File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -32,7 +32,7 @@ Essentially, the protocol proceeds in the following steps:
32
32
33
33
1 . Generate a keypair with ` secp256k1_keypair_create ` and obtain the xonly public key with ` secp256k1_keypair_xonly_pub ` .
34
34
2 . Call ` secp256k1_musig_pubkey_agg ` with the xonly pubkeys of all participants.
35
- 3 . Optionally add a (Taproot) tweak with ` secp256k1_musig_pubkey_tweak_add ` .
35
+ 3 . Optionally add a (Taproot) tweak with ` secp256k1_musig_pubkey_xonly_tweak_add ` .
36
36
4 . Generate a pair of secret and public nonce with ` secp256k1_musig_nonce_gen ` and send the public nonce to the other signers.
37
37
5 . Someone (not necessarily the signer) aggregates the public nonce with ` secp256k1_musig_nonce_agg ` and sends it to the signers.
38
38
6 . Process the aggregate nonce with ` secp256k1_musig_nonce_process ` .
You can’t perform that action at this time.
0 commit comments