ECDH
cryptoThe ECDH
function uses the Elliptic-curve Diffie–Hellman key agreement protocol to establish a secret.
The secret is derived from two ECC keys, one public, one private. This secret can be established independently by two parties who only need to share their ECC public keys and combine them with their private keys.
The public and private keys must use the same curve.