Note

This section is incomplete and will soon be updated.

The AEAs currently use the addresses associated with their private-public key pairs to identify themselves.

Keys of an AEA

To learn how to generate a private-public key pair check out the relevant CLI commands .

To learn more about public-key cryptography check out Wikipedia.