the generation relationship between the public-key, private-key, and address.
Step 1: randomly generate a private-key;
step 2: generate a public-key through the private-key;
step 3: obtain the address by intercepting the last 20 bytes of the public-key.