No, that’s not an correct understanding. The sender has to make use of the non-public keys related along with his personal UTXOs and use precisely the general public keys supplied by the receiver. They will try this with a lot of their UTXOs and even completely different mixtures of their UTXOs, besides, they don’t study something in regards to the receiver’s deal with physique, as a result of every deal with is a perform of the sender’s non-public keys and the receiver’s keys.