In the context of stealth addresses, addresses are now composed of two public keys, and the coins sent to Bob will not be sent to his stealth address on the blockchain, rather the stealth address will be used by the sender to produce fresh new bitcoin addresses for every new transaction. These new addresses, even though generated by the sender (Alice) and unknown to Bob until the transaction is made, will nonetheless be controlled by Bob! Here is how it works:
Thanks for the beefy explanation Vaas. I'm currently studying part of this now, but not yet onto stealth addresses.
It seems in general there is a lot of hashing depending on the protocol used, hashing the entire transaction sometimes after first hashing or combining with a large random integer, then also concatenation with either or both where the "+" signs normally represents concatenation or appending one number, or hash, to another and NOT simply adding them together.
I'm still getting down the basics of how different types of transactions are put together, using both cryptographic and mathematical means in order to make the addresses and hash pointers hardened to security breeches as much as possible; so if intercepted they cannot be spent without knowing the private key.
That is my understanding in much more basic terms.