It seems as though nobody is knowledgeable enough to figure out as to why generator points of 2 curves secp and secq256k1 both when divided by 2 generate the same coordinates. Either the so called "experts" and "cryptographers" are clueless as well or they refuse to reveal the secret. Asking questions on other platforms seems to produce the same scripted answers.
Now the only option is to produce very small curves and try all the possible points as G and then try both curves, N, P and then replace P with N to see if the x coordinates of n/2 on both curves can match. There is a relation between G, N and P.
Secp256k1 :
p= 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f
n= 0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141
Gx= 0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798
Gy= 0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8
n/2=
x= 0x00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
y= 0xc0c686408d517dfd67c2367651380d00d126e4229631fd03f8ff35eef1a61e3c
Secq256k1 :
p= 0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141
n= 0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f
Gx= 0x76c39f5585cb160eb6b06c87a2ce32e23134e45a097781a6a24288e37702eda6
Gy= 0x3ffc646c7b2918b5dc2d265a8e82a7f7d18983d26e8dc055a4120ddad952677f
n/2=
x= 0x00000000000000000000003b78ce563f89a0ed9414f5aa28ad0d96d6795f9c63
y= 0xd13ee134272115515be539ea7779c821fb1b3bc687c4d7d894ae3b70a2ca394e