I couldn't find much literature on this so I asked chatGPT which explained to me (quite possibly incorrectly) that:
Under normal circumstances d * G = Q (where d is the private key, G is the basepoint, Q is the public key, '*' represents scalar multiplication.) But if you were aware of a deeper relationship, by design or otherwise, where s * H = G (s is a scalar in the range of 2-N, H is a valid point on the curve) This would allow you to solve any private key in the system instantly, no ECDLP required, because you can substitute in d * (s*H) = G and solve it algebraically.
So can someone tell me if this is correct or incorrect?
I have struggled for days trying to understand this. If someone could let me know, maybe even make a python example that uses an example basepoint with a hidden relationship to demonstrate how it would work. That would mean a lot to me and anyone else interested in the same thing.
Regardless of whether or not SECP256k1's basepoint was chosen with a hidden relationship in mind, those hidden relationships still exist theoretically right? It's just another interesting way of looking at ECDLP.
Thank you
maybe this can help.Superfast method for solve ECDLP but for specific privkeys
Private keys are not multiple of 18051648. Private keys are power of z mod q, where z is a primitive root mod q.
like G^privkey
https://github.com/cysecud/ecc_weak_keys/issues/2