Source: https://arxiv.org/pdf/1909.06535

Note Structure Overview:

Encryption Process (Note Creation):

When creating a note, the sender encrypts the note details using the ECIES so only the intended recipient can decrypt it.

Key Agreement and Encryption of the Note:

The protocol uses an ephemeral key generated by the sender for secure encryption:

  1. Ephemeral Key Generation:
  2. Shared Secret Calculation:
  3. Encrypting the Note:

Including the Encrypted Note in a Transaction:

The transaction includes: