Derive them (using a hardened derivation path so that others can't derive the same path).

Reply to this note

Please Login to reply.

Discussion

Note that you also need a handshake to exchange keys, which could be done over some path derived from the pubkey for pretty good (but not perfect) privacy.

(This is something very similar to how PayNyms work.)