德玛西亚99
在阅读了Andrew W. Phillips的答案和https://github.com/bitherhq/go-bither/tree/release/1.7/crypto的一点帮助之后package mainimport ( "crypto/ecdsa" "crypto/elliptic" "crypto/rand" "fmt" "log" "math/big")func PubBytes(pub *ecdsa.PublicKey) []byte { if pub == nil || pub.X == nil || pub.Y == nil { return nil } return elliptic.Marshal(elliptic.P256(), pub.X, pub.Y)}func toECDSAFromHex(hexString string) (*ecdsa.PrivateKey, error) { pk := new(ecdsa.PrivateKey) pk.D, _ = new(big.Int).SetString(hexString, 16) pk.PublicKey.Curve = elliptic.P256() pk.PublicKey.X, pk.PublicKey.Y = pk.PublicKey.Curve.ScalarBaseMult(pk.D.Bytes()) return pk, nil}func main() { pHex := "E83385AF76B2B1997326B567461FB73DD9C27EAB9E1E86D26779F4650C5F2B75" pk, err := toECDSAFromHex(pHex) if err != nil { log.Fatal(err.Error()) } fmt.Printf("Generated Public Key: %x\n", PubBytes(&pk.PublicKey)) hash := []byte("Hello Gopher!") fmt.Printf("\nSigning...\n\n") r, s, err := ecdsa.Sign(rand.Reader, pk, hash) if err != nil { log.Fatal(err.Error()) } fmt.Printf("\nVerifying..\n\n") if ecdsa.Verify(&pk.PublicKey, hash, r, s) { fmt.Println("Success!!") } else { fmt.Println("Failure!!") }}// Output// Generated Public Key: 04265a5015c0cfd960e5a41f35e0a87874c1d8a28289d0d6ef6ac521ad49c3d80a8a7019ceef189819f066a947ad5726db1a4fe70a3208954c46b0e60f2bf7809c// // Signing...// // // Verifying..// // Success!!======== 原始答案 ===========不知道多少加密,但加密/椭圆具有元帅功能所以一旦你有一个 * PrivateKey也许下面的工作import ( "crypto/elliptic" "crypto/ecdsa")var privKey *ecdsa.PrivateKeyfunc main() { // some init to privKey pk := privKey.PublicKey() keybuf := elliptic.Marshal(pk.Curve, pk.X, pk.Y) log.Printf("Key: %s\n", string(keybuf))}我用这个完全在黑暗中拍摄。希望能帮助到你