The recipient generates a private key xr ∈ Zq* and the corresponding public key yr0 = G0xr, yr1 = G1xr.
The private key is kept private and the public key is published.
If the following two operations are executed quickly, the private key should be kept in ephemeral storage to reduce the risk of subsequential leakage.