diff --git a/applications/minotari_console_wallet/src/automation/commands.rs b/applications/minotari_console_wallet/src/automation/commands.rs
index 75817b3fdf..af6ba05732 100644
--- a/applications/minotari_console_wallet/src/automation/commands.rs
+++ b/applications/minotari_console_wallet/src/automation/commands.rs
@@ -839,10 +839,10 @@ pub async fn command_runner(
                 let out_dir = out_dir(&session_info.session_id)?;
                 let step_2_outputs_for_leader = Step2OutputsForLeader {
                     script_input_signature,
-                    wallet_public_spend_key: wallet_spend_key.key,
-                    public_script_nonce_key: script_nonce_key.key,
-                    public_sender_offset_key: sender_offset_key.key,
-                    public_sender_offset_nonce_key: sender_offset_nonce.key,
+                    wallet_public_spend_key: wallet_spend_key.pub_key,
+                    public_script_nonce_key: script_nonce_key.pub_key,
+                    public_sender_offset_key: sender_offset_key.pub_key,
+                    public_sender_offset_nonce_key: sender_offset_nonce.pub_key,
                     dh_shared_secret_public_key: shared_secret_public_key,
                 };
                 let out_file_leader = out_dir.join(get_file_name(STEP_2_LEADER, Some(args.alias.clone())));
diff --git a/applications/minotari_node/src/grpc/base_node_grpc_server.rs b/applications/minotari_node/src/grpc/base_node_grpc_server.rs
index 337c56fcb5..50872a8bb7 100644
--- a/applications/minotari_node/src/grpc/base_node_grpc_server.rs
+++ b/applications/minotari_node/src/grpc/base_node_grpc_server.rs
@@ -870,7 +870,7 @@ impl tari_rpc::base_node_server::BaseNode for BaseNodeGrpcServer {
                 .get_next_key(TransactionKeyManagerBranch::KernelNonce.get_branch_key())
                 .await
                 .map_err(|e| obscure_error_if_true(report_error_flag, Status::internal(e.to_string())))?;
-            total_nonce = &total_nonce + &new_nonce.key;
+            total_nonce = &total_nonce + &new_nonce.pub_key;
             total_excess = &total_excess + &coinbase_kernel.excess;
             private_keys.push((wallet_output.spending_key_id, new_nonce.key_id));
             kernel_message = TransactionKernel::build_kernel_signature_message(
@@ -1067,7 +1067,7 @@ impl tari_rpc::base_node_server::BaseNode for BaseNodeGrpcServer {
                 .get_next_key(TransactionKeyManagerBranch::KernelNonce.get_branch_key())
                 .await
                 .map_err(|e| obscure_error_if_true(report_error_flag, Status::internal(e.to_string())))?;
-            total_nonce = &total_nonce + &new_nonce.key;
+            total_nonce = &total_nonce + &new_nonce.pub_key;
             total_excess = &total_excess + &coinbase_kernel.excess;
             private_keys.push((wallet_output.spending_key_id, new_nonce.key_id));
             kernel_message = TransactionKernel::build_kernel_signature_message(
diff --git a/base_layer/core/src/blocks/faucets/mod.rs b/base_layer/core/src/blocks/faucets/mod.rs
index 09b77138e1..88dd787894 100644
--- a/base_layer/core/src/blocks/faucets/mod.rs
+++ b/base_layer/core/src/blocks/faucets/mod.rs
@@ -84,13 +84,9 @@ mod test {
         let mut total_private_key = PrivateKey::default();
 
         for _ in 0..num_faucets {
-            let (commitment_mask, script_key) =
-                key_manager.get_next_commitment_mask_and_script_key().await.unwrap();
-            total_private_key = total_private_key +
-                &key_manager
-                    .get_private_key(&commitment_mask.key_id)
-                    .await
-                    .unwrap();
+            let (commitment_mask, script_key) = key_manager.get_next_commitment_mask_and_script_key().await.unwrap();
+            total_private_key =
+                total_private_key + &key_manager.get_private_key(&commitment_mask.key_id).await.unwrap();
             let commitment = key_manager
                 .get_commitment(&commitment_mask.key_id, &amount.into())
                 .await
@@ -100,7 +96,7 @@ mod test {
                 .finalize()
                 .into();
 
-            let sender_offset_key = key_manager
+            let sender_offset = key_manager
                 .get_next_key(TransactionKeyManagerBranch::SenderOffset.get_branch_key())
                 .await
                 .unwrap();
@@ -110,7 +106,7 @@ mod test {
                 list_of_spend_keys.clone(),
                 Box::new(com_hash),
             )]);
-            let output = WalletOutputBuilder::new(amount, commitment_mask_key_id.key_id)
+            let output = WalletOutputBuilder::new(amount, commitment_mask.key_id)
                 .with_features(OutputFeatures::new(
                     OutputFeaturesVersion::get_current_version(),
                     OutputType::Standard,
@@ -125,10 +121,10 @@ mod test {
                 .unwrap()
                 .with_input_data(ExecutionStack::default())
                 .with_version(TransactionOutputVersion::get_current_version())
-                .with_sender_offset_public_key(sender_offset_key.key)
+                .with_sender_offset_public_key(sender_offset.pub_key)
                 .with_script_key(script_key.key_id)
                 .with_minimum_value_promise(amount)
-                .sign_as_sender_and_receiver(&key_manager, &sender_offset_key.key_id)
+                .sign_as_sender_and_receiver(&key_manager, &sender_offset.key_id)
                 .await
                 .unwrap()
                 .try_build(&key_manager)
diff --git a/base_layer/core/src/transactions/coinbase_builder.rs b/base_layer/core/src/transactions/coinbase_builder.rs
index ceb9a6c7f0..d9ad3d5cbd 100644
--- a/base_layer/core/src/transactions/coinbase_builder.rs
+++ b/base_layer/core/src/transactions/coinbase_builder.rs
@@ -297,7 +297,7 @@ where TKeyManagerInterface: TransactionKeyManagerInterface
             .get_partial_txo_kernel_signature(
                 &commitment_mask_key_id,
                 &public_nonce.key_id,
-                &public_nonce.key,
+                &public_nonce.pub_key,
                 &public_commitment_mask_key,
                 &kernel_version,
                 &kernel_message,
@@ -862,7 +862,7 @@ mod test {
             .get_partial_txo_kernel_signature(
                 &output.spending_key_id,
                 &new_nonce.key_id,
-                &new_nonce.key,
+                &new_nonce.pub_key,
                 &excess,
                 &TransactionKernelVersion::get_current_version(),
                 &kernel_message,
@@ -878,7 +878,7 @@ mod test {
             .unwrap();
         let sig_challenge = TransactionKernel::finalize_kernel_signature_challenge(
             &TransactionKernelVersion::get_current_version(),
-            &new_nonce.key,
+            &new_nonce.pub_key,
             &excess,
             &kernel_message,
         );
@@ -1005,7 +1005,7 @@ mod test {
             .get_next_key(TransactionKeyManagerBranch::KernelNonce.get_branch_key())
             .await
             .unwrap();
-        let nonce = &new_nonce1.key + &new_nonce2.key;
+        let nonce = &new_nonce1.pub_key + &new_nonce2.pub_key;
         let kernel_message = TransactionKernel::build_kernel_signature_message(
             &TransactionKernelVersion::get_current_version(),
             kernel_1.fee,
diff --git a/base_layer/core/src/transactions/key_manager/inner.rs b/base_layer/core/src/transactions/key_manager/inner.rs
index ba38f39d10..ab45d22993 100644
--- a/base_layer/core/src/transactions/key_manager/inner.rs
+++ b/base_layer/core/src/transactions/key_manager/inner.rs
@@ -178,7 +178,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
             index,
         };
         let key = self.get_public_key_at_key_id(&key_id).await?;
-        Ok(KeyAndId { key_id, key })
+        Ok(KeyAndId { key_id, pub_key: key })
     }
 
     pub async fn get_random_key(&self) -> Result<KeyAndId<PublicKey>, KeyManagerServiceError> {
@@ -187,7 +187,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
         let public_key = self.get_public_key_at_key_id(&key_id).await?;
         Ok(KeyAndId {
             key_id,
-            key: public_key,
+            pub_key: public_key,
         })
     }
 
@@ -258,7 +258,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
                 Ok(km.derive_public_key(*index)?.key)
             },
             KeyId::Derived { branch, label, index } => {
-                let public_alpha = self.get_spend_key().await?.key;
+                let public_alpha = self.get_spend_key().await?.pub_key;
                 let km = self
                     .key_managers
                     .get(branch)
@@ -387,7 +387,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
             index: 0,
         };
         let key = PublicKey::from_secret_key(&self.get_private_view_key().await?);
-        Ok(KeyAndId { key_id, key })
+        Ok(KeyAndId { key_id, pub_key: key })
     }
 
     pub async fn get_spend_key(&self) -> Result<KeyAndId<PublicKey>, KeyManagerServiceError> {
@@ -406,7 +406,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
             ))?,
             WalletType::ProvidedKeys(wallet) => wallet.public_spend_key.clone(),
         };
-        Ok(KeyAndId { key_id, key })
+        Ok(KeyAndId { key_id, pub_key: key })
     }
 
     pub async fn get_comms_key(&self) -> Result<KeyAndId<PublicKey>, KeyManagerServiceError> {
@@ -416,7 +416,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
         };
         let private_key = self.get_private_comms_key().await?;
         let key = PublicKey::from_secret_key(&private_key);
-        Ok(KeyAndId { key_id, key })
+        Ok(KeyAndId { key_id, pub_key: key })
     }
 
     pub async fn get_next_commitment_mask_and_script_key(
@@ -437,7 +437,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
         let script_public_key = self.get_public_key_at_key_id(&script_key_id).await?;
         Ok((commitment_mask, KeyAndId {
             key_id: script_key_id,
-            key: script_public_key,
+            pub_key: script_public_key,
         }))
     }
 
@@ -1177,7 +1177,7 @@ where TBackend: KeyManagerBackend<PublicKey> + 'static
                 spending_key_id,
                 value_as_private_key,
                 &sender_offset_public_key,
-                &ephemeral_pubkey.key,
+                &ephemeral_pubkey.pub_key,
                 txo_version,
                 metadata_signature_message,
                 range_proof_type,
diff --git a/base_layer/core/src/transactions/test_helpers.rs b/base_layer/core/src/transactions/test_helpers.rs
index c3ad5bcb78..d1f3d36f47 100644
--- a/base_layer/core/src/transactions/test_helpers.rs
+++ b/base_layer/core/src/transactions/test_helpers.rs
@@ -122,7 +122,7 @@ impl TestParams {
             .get_next_key(TransactionKeyManagerBranch::KernelNonce.get_branch_key())
             .await
             .unwrap();
-        let public_noncey = key_manager
+        let public_nonce = key_manager
             .get_next_key(TransactionKeyManagerBranch::Nonce.get_branch_key())
             .await
             .unwrap();
@@ -134,15 +134,15 @@ impl TestParams {
         Self {
             commitment_mask_key_id: commitment_mask_key.key_id,
             script_key_id: script_key.key_id,
-            script_key_pk: script_key.key,
-            sender_offset_key_id: sender_offset_key.key_id,
-            sender_offset_key_pk: sender_offset_key.key,
-            kernel_nonce_key_id: kernel_nonce_key.key_id,
-            kernel_nonce_key_pk: kernel_nonce_key.key,
-            public_nonce_key_id: public_nonce_key.key_id,
-            public_nonce_key_pk: public_nonce_key.key,
+            script_key_pk: script_key.pub_key,
+            sender_offset_key_id: sender_offset.key_id,
+            sender_offset_key_pk: sender_offset.pub_key,
+            kernel_nonce_key_id: kernel_nonce.key_id,
+            kernel_nonce_key_pk: kernel_nonce.pub_key,
+            public_nonce_key_id: public_nonce.key_id,
+            public_nonce_key_pk: public_nonce.pub_key,
             ephemeral_public_nonce_key_id: ephemeral_public_nonce.key_id,
-            ephemeral_public_nonce_key_pk: ephemeral_public_nonce.key,
+            ephemeral_public_nonce_key_pk: ephemeral_public_nonce.pub_key,
             transaction_weight: TransactionWeight::v1(),
         }
     }
@@ -308,7 +308,7 @@ pub async fn create_random_signature_from_secret_key(
         .get_partial_txo_kernel_signature(
             &secret_key_id,
             &total_nonce.key_id,
-            &total_nonce.key,
+            &total_nonce.pub_key,
             &total_excess,
             &kernel_version,
             &kernel_message,
@@ -736,7 +736,7 @@ pub async fn create_stx_protocol_internal(
         let script_key_id = KeyId::Derived {
             branch: TransactionKeyManagerBranch::CommitmentMask.get_branch_key(),
             label: TransactionKeyManagerLabel::ScriptKey.get_branch_key(),
-            index: commitment_mask_key.key_id.managed_index().unwrap(),
+            index: commitment_mask.key_id.managed_index().unwrap(),
         };
         let script_public_key = key_manager.get_public_key_at_key_id(&script_key_id).await.unwrap();
         let input_data = match &schema.input_data {
@@ -747,7 +747,7 @@ pub async fn create_stx_protocol_internal(
             Some(data) => data,
             None => TransactionOutputVersion::get_current_version(),
         };
-        let output = WalletOutputBuilder::new(val, commitment_mask_key.key_id)
+        let output = WalletOutputBuilder::new(val, commitment_mask.key_id)
             .with_features(schema.features.clone())
             .with_script(schema.script.clone())
             .encrypt_data_for_recovery(key_manager, None, PaymentId::Empty)
@@ -756,9 +756,9 @@ pub async fn create_stx_protocol_internal(
             .with_input_data(input_data)
             .with_covenant(schema.covenant.clone())
             .with_version(version)
-            .with_sender_offset_public_key(sender_offset_key.key)
+            .with_sender_offset_public_key(sender_offset.pub_key)
             .with_script_key(script_key_id.clone())
-            .sign_as_sender_and_receiver(key_manager, &sender_offset_key.key_id)
+            .sign_as_sender_and_receiver(key_manager, &sender_offset.key_id)
             .await
             .unwrap()
             .try_build(key_manager)
@@ -766,7 +766,7 @@ pub async fn create_stx_protocol_internal(
             .unwrap();
 
         outputs.push(output.clone());
-        stx_builder.with_output(output, sender_offset_key.key_id).await.unwrap();
+        stx_builder.with_output(output, sender_offset.key_id).await.unwrap();
     }
     for mut utxo in schema.to_outputs {
         let sender_offset = key_manager
@@ -778,7 +778,7 @@ pub async fn create_stx_protocol_internal(
             .get_metadata_signature(
                 &utxo.spending_key_id,
                 &utxo.value.into(),
-                &sender_offset_key.key_id,
+                &sender_offset.key_id,
                 &utxo.version,
                 &metadata_message,
                 utxo.features.range_proof_type,
@@ -786,7 +786,7 @@ pub async fn create_stx_protocol_internal(
             .await
             .unwrap();
 
-        stx_builder.with_output(utxo, sender_offset_key.key_id).await.unwrap();
+        stx_builder.with_output(utxo, sender_offset.key_id).await.unwrap();
     }
 
     stx_builder
@@ -813,7 +813,7 @@ pub async fn create_coinbase_kernel(
         .get_partial_txo_kernel_signature(
             commitment_mask_key_id,
             &public_nonce.key_id,
-            &public_nonce.key,
+            &public_nonce.pub_key,
             &public_commitment_mask,
             &kernel_version,
             &kernel_message,
@@ -858,7 +858,7 @@ pub async fn create_utxo(
         .await
         .unwrap();
     let encrypted_data = key_manager
-        .encrypt_data_for_recovery(&commitment_mask_key.key_id, None, value.into(), PaymentId::Empty)
+        .encrypt_data_for_recovery(&commitment_mask.key_id, None, value.into(), PaymentId::Empty)
         .await
         .unwrap();
     let sender_offset = key_manager
@@ -875,9 +875,9 @@ pub async fn create_utxo(
     );
     let metadata_sig = key_manager
         .get_metadata_signature(
-            &commitment_mask_key.key_id,
+            &commitment_mask.key_id,
             &value.into(),
-            &sender_offset_key.key_id,
+            &sender_offset.key_id,
             &TransactionOutputVersion::get_current_version(),
             &metadata_message,
             features.range_proof_type,
@@ -885,13 +885,13 @@ pub async fn create_utxo(
         .await
         .unwrap();
     let commitment = key_manager
-        .get_commitment(&commitment_mask_key.key_id, &value.into())
+        .get_commitment(&commitment_mask.key_id, &value.into())
         .await
         .unwrap();
     let proof = if features.range_proof_type == RangeProofType::BulletProofPlus {
         Some(
             key_manager
-                .construct_range_proof(&commitment_mask_key.key_id, value.into(), minimum_value_promise.into())
+                .construct_range_proof(&commitment_mask.key_id, value.into(), minimum_value_promise.into())
                 .await
                 .unwrap(),
         )
@@ -904,7 +904,7 @@ pub async fn create_utxo(
         commitment,
         proof,
         script.clone(),
-        sender_offset_key.key,
+        sender_offset.pub_key,
         metadata_sig,
         covenant.clone(),
         encrypted_data,
@@ -912,7 +912,7 @@ pub async fn create_utxo(
     );
     utxo.verify_range_proof(&CryptoFactories::default().range_proof)
         .unwrap();
-    (utxo, commitment_mask_key.key_id, sender_offset_key.key_id)
+    (utxo, commitment_mask.key_id, sender_offset.key_id)
 }
 
 pub async fn schema_to_transaction(
diff --git a/base_layer/core/src/transactions/transaction_components/wallet_output.rs b/base_layer/core/src/transactions/transaction_components/wallet_output.rs
index 6e85f8939a..ec1d50ca8e 100644
--- a/base_layer/core/src/transactions/transaction_components/wallet_output.rs
+++ b/base_layer/core/src/transactions/transaction_components/wallet_output.rs
@@ -256,7 +256,7 @@ impl WalletOutput {
         let script_public_key_self = key_manager.get_public_key_at_key_id(&self.script_key_id).await?;
         let script_public_key = aggregated_script_public_key_shares + script_public_key_self;
 
-        let total_ephemeral_public_key = aggregated_script_signature_public_nonces + &ephemeral_public_key_self.key;
+        let total_ephemeral_public_key = aggregated_script_signature_public_nonces + &ephemeral_public_key_self.pub_key;
         let commitment_partial_script_signature = key_manager
             .get_partial_script_signature(
                 &self.spending_key_id,
diff --git a/base_layer/core/src/transactions/transaction_components/wallet_output_builder.rs b/base_layer/core/src/transactions/transaction_components/wallet_output_builder.rs
index d6da2fe424..7280e139b3 100644
--- a/base_layer/core/src/transactions/transaction_components/wallet_output_builder.rs
+++ b/base_layer/core/src/transactions/transaction_components/wallet_output_builder.rs
@@ -229,7 +229,7 @@ impl WalletOutputBuilder {
         let ephemeral_pubkey_self = key_manager
             .get_next_key(TransactionKeyManagerBranch::MetadataEphemeralNonce.get_branch_key())
             .await?;
-        let aggregate_ephemeral_pubkey = aggregated_ephemeral_public_key_shares + &ephemeral_pubkey_self.key;
+        let aggregate_ephemeral_pubkey = aggregated_ephemeral_public_key_shares + &ephemeral_pubkey_self.pub_key;
 
         let receiver_partial_metadata_signature = key_manager
             .get_receiver_partial_metadata_signature(
@@ -324,11 +324,11 @@ mod test {
         let kmob = WalletOutputBuilder::new(value, commitment_mask_key.key_id.clone());
         let kmob = kmob.with_script(TariScript::new(vec![]));
         assert!(kmob.clone().try_build(&key_manager).await.is_err());
-        let sender_offset_key = key_manager
+        let sender_offset = key_manager
             .get_next_key(TransactionKeyManagerBranch::SenderOffset.get_branch_key())
             .await
             .unwrap();
-        let kmob = kmob.with_sender_offset_public_key(sender_offset_key.key);
+        let kmob = kmob.with_sender_offset_public_key(sender_offset.pub_key);
         assert!(kmob.clone().try_build(&key_manager).await.is_err());
         let kmob = kmob.with_input_data(ExecutionStack::new(vec![]));
         let kmob = kmob.with_script_key(script_key_id.key_id);
@@ -337,7 +337,7 @@ mod test {
             .encrypt_data_for_recovery(&key_manager, None, PaymentId::Empty)
             .await
             .unwrap()
-            .sign_as_sender_and_receiver(&key_manager, &sender_offset_key.key_id)
+            .sign_as_sender_and_receiver(&key_manager, &sender_offset.key_id)
             .await
             .unwrap();
         match kmob.clone().try_build(&key_manager).await {
@@ -365,11 +365,11 @@ mod test {
         let value = MicroMinotari(100);
         let kmob = WalletOutputBuilder::new(value, commitment_mask_key.key_id.clone());
         let kmob = kmob.with_script(TariScript::new(vec![]));
-        let sender_offset_key = key_manager
+        let sender_offset = key_manager
             .get_next_key(TransactionKeyManagerBranch::SenderOffset.get_branch_key())
             .await
             .unwrap();
-        let kmob = kmob.with_sender_offset_public_key(sender_offset_key.key);
+        let kmob = kmob.with_sender_offset_public_key(sender_offset.pub_key);
         let kmob = kmob.with_input_data(ExecutionStack::new(vec![]));
         let kmob = kmob.with_script_key(script_key.key_id);
         let kmob = kmob.with_features(OutputFeatures::default());
@@ -377,7 +377,7 @@ mod test {
             .encrypt_data_for_recovery(&key_manager, None, PaymentId::Empty)
             .await
             .unwrap()
-            .sign_as_sender_and_receiver(&key_manager, &sender_offset_key.key_id)
+            .sign_as_sender_and_receiver(&key_manager, &sender_offset.key_id)
             .await
             .unwrap();
         match kmob.clone().try_build(&key_manager).await {
@@ -397,7 +397,7 @@ mod test {
                         &wallet_output.spending_key_id,
                         &wallet_output.value.into(),
                         &wallet_output.sender_offset_public_key,
-                        &ephemeral_key.key,
+                        &ephemeral_key.pub_key,
                         &wallet_output.version,
                         &metadata_message,
                         wallet_output.features.range_proof_type,
@@ -412,7 +412,7 @@ mod test {
                 let sender_metadata_signature = key_manager
                     .get_sender_partial_metadata_signature(
                         &ephemeral_key.key_id,
-                        &sender_offset_key.key_id,
+                        &sender_offset.key_id,
                         &commitment,
                         receiver_metadata_signature.ephemeral_commitment(),
                         &wallet_output.version,
diff --git a/base_layer/core/src/transactions/transaction_protocol/sender.rs b/base_layer/core/src/transactions/transaction_protocol/sender.rs
index 7b93ac2386..af5a275ac8 100644
--- a/base_layer/core/src/transactions/transaction_protocol/sender.rs
+++ b/base_layer/core/src/transactions/transaction_protocol/sender.rs
@@ -963,7 +963,7 @@ mod test {
             .await
             .unwrap();
         let value = 1000u64;
-        let sender_offset_key = key_manager
+        let sender_offset = key_manager
             .get_next_key(TransactionKeyManagerBranch::SenderOffset.get_branch_key())
             .await
             .unwrap();
@@ -1004,8 +1004,8 @@ mod test {
             .get_receiver_partial_metadata_signature(
                 &commitment_mask_key.key_id,
                 &value.into(),
-                &sender_offset_key.key,
-                &ephemeral_key.key,
+                &sender_offset.pub_key,
+                &ephemeral_key.pub_key,
                 &txo_version,
                 &metadata_message,
                 output_features.range_proof_type,
@@ -1018,7 +1018,7 @@ mod test {
             commitment,
             Some(proof),
             script.clone(),
-            sender_offset_key.key,
+            sender_offset.pub_key,
             partial_metadata_signature.clone(),
             covenant.clone(),
             encrypted_data,
@@ -1030,7 +1030,7 @@ mod test {
         let partial_sender_metadata_signature = key_manager
             .get_sender_partial_metadata_signature(
                 &ephemeral_key.key_id,
-                &sender_offset_key.key_id,
+                &sender_offset.key_id,
                 &output.commitment,
                 partial_metadata_signature.ephemeral_commitment(),
                 &txo_version,
diff --git a/base_layer/core/src/transactions/transaction_protocol/single_receiver.rs b/base_layer/core/src/transactions/transaction_protocol/single_receiver.rs
index f4fca82f02..883cff1f0d 100644
--- a/base_layer/core/src/transactions/transaction_protocol/single_receiver.rs
+++ b/base_layer/core/src/transactions/transaction_protocol/single_receiver.rs
@@ -77,7 +77,7 @@ impl SingleReceiverTransactionProtocol {
             .get_partial_txo_kernel_signature(
                 &output.spending_key_id,
                 &public_nonce.key_id,
-                &(&sender_info.public_nonce + &public_nonce.key),
+                &(&sender_info.public_nonce + &public_nonce.pub_key),
                 &(&sender_info.public_excess + &public_excess),
                 &sender_info.kernel_version,
                 &kernel_message,
diff --git a/base_layer/core/src/transactions/transaction_protocol/transaction_initializer.rs b/base_layer/core/src/transactions/transaction_protocol/transaction_initializer.rs
index c75c2bb1a7..85fdea1e0d 100644
--- a/base_layer/core/src/transactions/transaction_protocol/transaction_initializer.rs
+++ b/base_layer/core/src/transactions/transaction_protocol/transaction_initializer.rs
@@ -369,7 +369,7 @@ where KM: TransactionKeyManagerInterface
                         let change_script = change_data.change_script.clone();
                         let change_script_key_id = change_data.change_script_key_id.clone();
                         let change_key_id = change_data.change_commitment_mask_key_id.clone();
-                        let sender_offset_public_key = self
+                        let sender_offset_public = self
                             .key_manager
                             .get_next_key(TransactionKeyManagerBranch::SenderOffset.get_branch_key())
                             .await
@@ -408,7 +408,7 @@ where KM: TransactionKeyManagerInterface
                             .get_metadata_signature(
                                 &change_key_id,
                                 &v.into(),
-                                &sender_offset_public_key.key_id,
+                                &sender_offset_public.key_id,
                                 &output_version,
                                 &metadata_message,
                                 features.range_proof_type,
@@ -423,7 +423,7 @@ where KM: TransactionKeyManagerInterface
                             change_script,
                             input_data,
                             change_script_key_id,
-                            sender_offset_public_key.key.clone(),
+                            sender_offset_public.pub_key.clone(),
                             metadata_sig,
                             0,
                             covenant,
@@ -437,7 +437,7 @@ where KM: TransactionKeyManagerInterface
                         Ok((
                             fee_without_change + change_fee,
                             v,
-                            Some((change_wallet_output, sender_offset_public_key.key_id)),
+                            Some((change_wallet_output, sender_offset_public.key_id)),
                         ))
                     },
                 }
diff --git a/base_layer/core/tests/helpers/block_builders.rs b/base_layer/core/tests/helpers/block_builders.rs
index a9e2ab60c9..1e133655db 100644
--- a/base_layer/core/tests/helpers/block_builders.rs
+++ b/base_layer/core/tests/helpers/block_builders.rs
@@ -88,7 +88,7 @@ pub async fn create_coinbase(
         .get_partial_txo_kernel_signature(
             &p.commitment_mask_key_id,
             &nonce.key_id,
-            &nonce.key,
+            &nonce.pub_key,
             &public_exess,
             &TransactionKernelVersion::get_current_version(),
             &kernel_message,
diff --git a/base_layer/core/tests/tests/mempool.rs b/base_layer/core/tests/tests/mempool.rs
index 9a7a1b5b79..083f3fec15 100644
--- a/base_layer/core/tests/tests/mempool.rs
+++ b/base_layer/core/tests/tests/mempool.rs
@@ -1229,7 +1229,7 @@ async fn consensus_validation_large_tx() {
             .await
             .unwrap();
     let mut sender_offsets = Vec::new();
-    let mut pub_nonce = input_kernel_nonce.key.clone();
+    let mut pub_nonce = input_kernel_nonce.pub_key.clone();
     for i in 0..output_count {
         let test_params = TestParams::new(&key_manager).await;
         let output_amount = if i < output_count - 1 {
@@ -1416,7 +1416,7 @@ async fn validation_reject_min_fee() {
             )
             .await
             .unwrap();
-    let pub_nonce = input_kernel_nonce.key + test_params.kernel_nonce_key_pk;
+    let pub_nonce = input_kernel_nonce.pub_key + test_params.kernel_nonce_key_pk;
     sender_offsets.push(test_params.sender_offset_key_id.clone());
 
     let mut agg_sig = Signature::default();
diff --git a/base_layer/core/tests/tests/node_comms_interface.rs b/base_layer/core/tests/tests/node_comms_interface.rs
index 93dd3fdf0c..cd6c80d6a6 100644
--- a/base_layer/core/tests/tests/node_comms_interface.rs
+++ b/base_layer/core/tests/tests/node_comms_interface.rs
@@ -301,7 +301,7 @@ async fn initialize_sender_transaction_protocol_for_overflow_test(
             .get_next_key(TransactionKeyManagerBranch::CommitmentMask.get_branch_key())
             .await
             .unwrap();
-        let sender_offset_key = key_manager
+        let sender_offset = key_manager
             .get_next_key(TransactionKeyManagerBranch::SenderOffset.get_branch_key())
             .await
             .unwrap();
@@ -330,16 +330,16 @@ async fn initialize_sender_transaction_protocol_for_overflow_test(
             .with_input_data(input_data)
             .with_covenant(txn_schema.covenant.clone())
             .with_version(version)
-            .with_sender_offset_public_key(sender_offset_key.key)
+            .with_sender_offset_public_key(sender_offset.pub_key)
             .with_script_key(script_key_id.clone())
-            .sign_as_sender_and_receiver(key_manager, &sender_offset_key.key_id)
+            .sign_as_sender_and_receiver(key_manager, &sender_offset.key_id)
             .await
             .unwrap()
             .try_build(key_manager)
             .await
             .unwrap();
 
-        stx_builder.with_output(output, sender_offset_key.key_id).await.unwrap();
+        stx_builder.with_output(output, sender_offset.key_id).await.unwrap();
     }
     for mut utxo in txn_schema.to_outputs {
         let sender_offset_key = key_manager
diff --git a/base_layer/key_manager/src/key_manager_service/service.rs b/base_layer/key_manager/src/key_manager_service/service.rs
index d42f4791bd..681edc5bb4 100644
--- a/base_layer/key_manager/src/key_manager_service/service.rs
+++ b/base_layer/key_manager/src/key_manager_service/service.rs
@@ -114,7 +114,7 @@ where
                 branch: branch.to_string(),
                 index,
             },
-            key,
+            pub_key: key,
         })
     }
 
@@ -124,7 +124,7 @@ where
         let public_key = self.get_public_key_at_key_id(&key_id).await?;
         Ok(KeyAndId {
             key_id,
-            key: public_key,
+            pub_key: public_key,
         })
     }
 
diff --git a/base_layer/wallet/src/output_manager_service/service.rs b/base_layer/wallet/src/output_manager_service/service.rs
index 3a79670799..9421218452 100644
--- a/base_layer/wallet/src/output_manager_service/service.rs
+++ b/base_layer/wallet/src/output_manager_service/service.rs
@@ -749,7 +749,7 @@ where
         let script = if single_round_sender_data.script == script!(Nop) {
             single_round_sender_data.script.clone()
         } else if single_round_sender_data.script == script!(PushPubKey(Box::default())) {
-            script!(PushPubKey(Box::new(script_public_key.key.clone())))
+            script!(PushPubKey(Box::new(script_public_key.pub_key.clone())))
         } else {
             return Err(OutputManagerError::InvalidScriptHash);
         };
@@ -996,7 +996,7 @@ where
             .get_next_commitment_mask_and_script_key()
             .await?;
         builder.with_change_data(
-            script!(PushPubKey(Box::new(change_script_key.key.clone()))),
+            script!(PushPubKey(Box::new(change_script_key.pub_key.clone()))),
             ExecutionStack::default(),
             change_script_key.key_id,
             change_commitment_mask_key.key_id,
@@ -1103,7 +1103,7 @@ where
                 .get_next_commitment_mask_and_script_key()
                 .await?;
             builder.with_change_data(
-                script!(PushPubKey(Box::new(change_script_key.key))),
+                script!(PushPubKey(Box::new(change_script_key.pub_key))),
                 ExecutionStack::default(),
                 change_script_key.key_id,
                 change_commitment_mask_key.key_id,
@@ -1250,7 +1250,10 @@ where
                         &script_challange,
                     )
                     .await?;
-                script_input_shares.insert(self.resources.key_manager.get_spend_key().await?.key, self_signature);
+                script_input_shares.insert(
+                    self.resources.key_manager.get_spend_key().await?.pub_key,
+                    self_signature,
+                );
 
                 // the order here is important, we need to add the signatures in the same order as public keys where
                 // added to the script originally
@@ -1258,7 +1261,7 @@ where
                     if let Some(signature) = script_input_shares.get(&key) {
                         script_signatures.push(StackItem::Signature(signature.clone()));
                         // our own key should not be added yet, it will be added with the script signing
-                        if key != self.resources.key_manager.get_spend_key().await?.key {
+                        if key != self.resources.key_manager.get_spend_key().await?.pub_key {
                             aggregated_script_public_key_shares = aggregated_script_public_key_shares + key;
                         }
                     }
@@ -1562,7 +1565,7 @@ where
             .get_next_commitment_mask_and_script_key()
             .await?;
         builder.with_change_data(
-            script!(PushPubKey(Box::new(change_script_public_key.key.clone()))),
+            script!(PushPubKey(Box::new(change_script_public_key.pub_key.clone()))),
             ExecutionStack::default(),
             change_script_public_key.key_id.clone(),
             change_commitment_mask_key_id.key_id,
@@ -2196,7 +2199,7 @@ where
                 .get_next_commitment_mask_and_script_key()
                 .await?;
             tx_builder.with_change_data(
-                script!(PushPubKey(Box::new(change_script.key))),
+                script!(PushPubKey(Box::new(change_script.pub_key))),
                 ExecutionStack::default(),
                 change_script.key_id,
                 change_mask.key_id,
@@ -2277,7 +2280,7 @@ where
             .key_manager
             .get_next_commitment_mask_and_script_key()
             .await?;
-        let script = script!(PushPubKey(Box::new(script_key.key.clone())));
+        let script = script!(PushPubKey(Box::new(script_key.pub_key.clone())));
 
         let encrypted_data = self
             .resources
@@ -2319,7 +2322,7 @@ where
                 script,
                 ExecutionStack::default(),
                 script_key.key_id,
-                sender_offset.key,
+                sender_offset.pub_key,
                 metadata_signature,
                 0,
                 covenant,
@@ -2535,7 +2538,7 @@ where
                     .get_next_commitment_mask_and_script_key()
                     .await?;
                 builder.with_change_data(
-                    script!(PushPubKey(Box::new(change_script_key.key.clone()))),
+                    script!(PushPubKey(Box::new(change_script_key.pub_key.clone()))),
                     ExecutionStack::default(),
                     change_script_key.key_id,
                     change_commitment_mask_key.key_id,
@@ -2619,7 +2622,7 @@ where
             .get_next_commitment_mask_and_script_key()
             .await?;
         builder.with_change_data(
-            script!(PushPubKey(Box::new(change_script_key.key.clone()))),
+            script!(PushPubKey(Box::new(change_script_key.pub_key.clone()))),
             ExecutionStack::default(),
             change_script_key.key_id,
             change_commitment_mask_key.key_id,
@@ -2727,7 +2730,7 @@ where
                         .get_diffie_hellman_stealth_domain_hasher(&view_key.key_id, &output.sender_offset_public_key)
                         .await?;
                     let script_spending_key =
-                        stealth_address_script_spending_key(&stealth_address_hasher, &spend_key.key);
+                        stealth_address_script_spending_key(&stealth_address_hasher, &spend_key.pub_key);
                     if &script_spending_key != scanned_pk.as_ref() {
                         continue;
                     }
diff --git a/base_layer/wallet/src/transaction_service/service.rs b/base_layer/wallet/src/transaction_service/service.rs
index 002b431cec..7850127b2b 100644
--- a/base_layer/wallet/src/transaction_service/service.rs
+++ b/base_layer/wallet/src/transaction_service/service.rs
@@ -268,13 +268,13 @@ where
             TariAddressFeatures::create_one_sided_only()
         };
         let one_sided_tari_address = TariAddress::new_dual_address(
-            view_key.key.clone(),
-            comms_key.key,
+            view_key.pub_key.clone(),
+            comms_key.pub_key,
             network,
             TariAddressFeatures::create_one_sided_only(),
         );
         let interactive_tari_address =
-            TariAddress::new_dual_address(view_key.key, spend_key.key, network, interactive_features);
+            TariAddress::new_dual_address(view_key.pub_key, spend_key.pub_key, network, interactive_features);
         let resources = TransactionServiceResources {
             db: db.clone(),
             output_manager_service,
@@ -1105,7 +1105,7 @@ where
             .transaction_key_manager_service
             .get_comms_key()
             .await?
-            .key ==
+            .pub_key ==
             destination.comms_public_key()
         {
             debug!(
@@ -2306,7 +2306,7 @@ where
 
         Ok((tx_id, BurntProof {
             // Key used to claim the burn on L2
-            reciprocal_claim_public_key: commitment_mask_key.key,
+            reciprocal_claim_public_key: commitment_mask_key.pub_key,
             commitment,
             ownership_proof,
             range_proof,
diff --git a/base_layer/wallet/src/utxo_scanner_service/initializer.rs b/base_layer/wallet/src/utxo_scanner_service/initializer.rs
index 5ff91debb0..88e20ebcb3 100644
--- a/base_layer/wallet/src/utxo_scanner_service/initializer.rs
+++ b/base_layer/wallet/src/utxo_scanner_service/initializer.rs
@@ -113,8 +113,8 @@ where
                 .await
                 .expect("Could not initialize UTXO scanner Service");
             let one_sided_tari_address = TariAddress::new_dual_address(
-                view_key.key,
-                spend_key.key,
+                view_key.pub_key,
+                spend_key.pub_key,
                 network,
                 TariAddressFeatures::create_one_sided_only(),
             );
diff --git a/base_layer/wallet/src/wallet.rs b/base_layer/wallet/src/wallet.rs
index ef43d48a69..b0ce4caf25 100644
--- a/base_layer/wallet/src/wallet.rs
+++ b/base_layer/wallet/src/wallet.rs
@@ -484,8 +484,8 @@ where
             WalletType::Ledger(_) | WalletType::ProvidedKeys(_) => TariAddressFeatures::create_interactive_only(),
         };
         Ok(TariAddress::new_dual_address(
-            view_key.key,
-            comms_key.key,
+            view_key.pub_key,
+            comms_key.pub_key,
             self.network.as_network(),
             features,
         ))
@@ -495,8 +495,8 @@ where
         let view_key = self.key_manager_service.get_view_key().await?;
         let spend_key = self.key_manager_service.get_spend_key().await?;
         Ok(TariAddress::new_dual_address(
-            view_key.key,
-            spend_key.key,
+            view_key.pub_key,
+            spend_key.pub_key,
             self.network.as_network(),
             TariAddressFeatures::create_one_sided_only(),
         ))
diff --git a/base_layer/wallet/tests/key_manager_service_tests/service.rs b/base_layer/wallet/tests/key_manager_service_tests/service.rs
index b3726569db..18bbe2adf0 100644
--- a/base_layer/wallet/tests/key_manager_service_tests/service.rs
+++ b/base_layer/wallet/tests/key_manager_service_tests/service.rs
@@ -66,7 +66,7 @@ async fn get_key_at_test_with_encryption() {
         })
         .await
         .unwrap();
-    assert_eq!(key_1.key, key_1_2);
+    assert_eq!(key_1.pub_key, key_1_2);
 }
 
 #[tokio::test]
@@ -147,7 +147,7 @@ async fn key_manager_find_index() {
     let _next_key = key_manager.get_next_key("branch1").await.unwrap();
     let _next_key = key_manager.get_next_key("branch1").await.unwrap();
     let key_1 = key_manager.get_next_key("branch1").await.unwrap();
-    let index = key_manager.find_key_index("branch1", &key_1.key).await.unwrap();
+    let index = key_manager.find_key_index("branch1", &key_1.pub_key).await.unwrap();
 
     assert_eq!(index, 3);
 }
@@ -170,7 +170,7 @@ async fn key_manager_update_current_key_index_if_higher() {
     let _next_key_result = key_manager.get_next_key("branch1").await.unwrap();
     let _next_key_result = key_manager.get_next_key("branch1").await.unwrap();
     let key_1 = key_manager.get_next_key("branch1").await.unwrap();
-    let index = key_manager.find_key_index("branch1", &key_1.key).await.unwrap();
+    let index = key_manager.find_key_index("branch1", &key_1.pub_key).await.unwrap();
 
     assert_eq!(index, 3);
 
@@ -188,7 +188,7 @@ async fn key_manager_update_current_key_index_if_higher() {
         .unwrap();
     let index = key_manager.find_key_index("branch1", &key_1_2).await.unwrap();
     assert_eq!(index, 7);
-    assert_eq!(key_1_2, key_1.key);
+    assert_eq!(key_1_2, key_1.pub_key);
 }
 
 #[tokio::test]
@@ -220,7 +220,7 @@ async fn key_manager_test_index() {
 
     assert_eq!(
         result.key_id.managed_index().unwrap(),
-        key_manager.find_key_index("branch1", &result.key).await.unwrap()
+        key_manager.find_key_index("branch1", &result.pub_key).await.unwrap()
     );
     assert_eq!(
         result.key_id.managed_index().unwrap(),
diff --git a/base_layer/wallet/tests/transaction_service_tests/service.rs b/base_layer/wallet/tests/transaction_service_tests/service.rs
index c7600d2178..e4a55087e7 100644
--- a/base_layer/wallet/tests/transaction_service_tests/service.rs
+++ b/base_layer/wallet/tests/transaction_service_tests/service.rs
@@ -1767,7 +1767,7 @@ async fn recover_one_sided_transaction() {
     let mut alice_ts_clone = alice_ts.clone();
     let bob_view_key = bob_key_manager_handle.get_view_key().await.unwrap();
     let bob_address = TariAddress::new_dual_address_with_default_features(
-        bob_view_key.key,
+        bob_view_key.pub_key,
         bob_node_identity.public_key().clone(),
         network,
     );
@@ -1891,7 +1891,7 @@ async fn recover_stealth_one_sided_transaction() {
     let mut alice_ts_clone = alice_ts.clone();
 
     let bob_address = TariAddress::new_dual_address_with_default_features(
-        bob_view_key.key,
+        bob_view_key.pub_key,
         bob_node_identity.public_key().clone(),
         network,
     );
@@ -2002,7 +2002,7 @@ async fn test_htlc_send_and_claim() {
     let bob_pubkey = bob_ts_interface.base_node_identity.public_key().clone();
     let bob_view_key = bob_ts_interface.key_manager_handle.get_view_key().await.unwrap();
     let bob_address =
-        TariAddress::new_dual_address_with_default_features(bob_view_key.key, bob_pubkey.clone(), network);
+        TariAddress::new_dual_address_with_default_features(bob_view_key.pub_key, bob_pubkey.clone(), network);
     let (tx_id, pre_image, output) = alice_ts
         .send_sha_atomic_swap_transaction(
             bob_address,
@@ -4225,7 +4225,7 @@ async fn test_restarting_transaction_protocols() {
 
     let bob_view_key = bob_ts_interface.key_manager_handle.get_view_key().await.unwrap();
     let bob_address = TariAddress::new_dual_address_with_default_features(
-        bob_view_key.key,
+        bob_view_key.pub_key,
         bob_identity.public_key().clone(),
         network,
     );
@@ -4251,7 +4251,7 @@ async fn test_restarting_transaction_protocols() {
         .unwrap();
     let alice_view_key = alice_ts_interface.key_manager_handle.get_view_key().await.unwrap();
     let alice_address = TariAddress::new_dual_address_with_default_features(
-        alice_view_key.key,
+        alice_view_key.pub_key,
         alice_identity.public_key().clone(),
         network,
     );
diff --git a/base_layer/wallet/tests/transaction_service_tests/transaction_protocols.rs b/base_layer/wallet/tests/transaction_service_tests/transaction_protocols.rs
index 7163cb7f22..92922c7b27 100644
--- a/base_layer/wallet/tests/transaction_service_tests/transaction_protocols.rs
+++ b/base_layer/wallet/tests/transaction_service_tests/transaction_protocols.rs
@@ -167,13 +167,13 @@ pub async fn setup() -> (
         TariAddressFeatures::create_one_sided_only()
     };
     let one_sided_tari_address = TariAddress::new_dual_address(
-        view_key.key.clone(),
-        comms_key.key,
+        view_key.pub_key.clone(),
+        comms_key.pub_key,
         network,
         TariAddressFeatures::create_one_sided_only(),
     );
     let interactive_tari_address =
-        TariAddress::new_dual_address(view_key.key, spend_key.key, network, interactive_features);
+        TariAddress::new_dual_address(view_key.pub_key, spend_key.pub_key, network, interactive_features);
     let resources = TransactionServiceResources {
         db,
         output_manager_service: output_manager_service_handle,
diff --git a/base_layer/wallet/tests/utxo_scanner/mod.rs b/base_layer/wallet/tests/utxo_scanner/mod.rs
index 9ac701c327..e985560f59 100644
--- a/base_layer/wallet/tests/utxo_scanner/mod.rs
+++ b/base_layer/wallet/tests/utxo_scanner/mod.rs
@@ -195,7 +195,7 @@ async fn setup(
 
     let view_key = key_manager.get_view_key().await.unwrap();
     let tari_address = TariAddress::new_dual_address_with_default_features(
-        view_key.key,
+        view_key.pub_key,
         node_identity.public_key().clone(),
         Network::default(),
     );