Skip to content
This repository has been archived by the owner on Dec 28, 2023. It is now read-only.

Stealth Address

Gary Yu edited this page May 16, 2020 · 2 revisions

Recent Major Changes:

  • (14 May 2020) Creation (on Cryptology ePrint Archive)

Warning1

feedback & discussion zone

Abstract

In a blockchain system, address is an essential primitive which is used in transaction. The Stealth Address, which has an underlying address info of two public keys (A,B), was developed by Monero blockchain in 2013, in which a one-time public key is used as the transaction destination, to protect the recipient privacy. At almost same time, hierarchical deterministic wallets scheme was proposed as bip-32 for Bitcoin, which makes it possible to share an extended public key (K,c) between sender and receiver, where K is a public key and c is a 256-bits chain code, and only receiver knows the corresponding private key of this K. With the bip-32 scheme, the sender may derive the child public key Ki with the child number i by him/herself, without needing to request a new address for each payment from the receiver, make each transaction have a different destination key for privacy. This paper introduces an improved stealth address scheme which has an underlying address data of (Ai,Bi,i), where i is a child number and i∈[0,231-1]. The sender gets the receiver’s address info (Ai,Bi,i), generates a random secret number r ∈ [0,264-1] and calculate a Pedersen commitment C=Ai Bi h(R'.x) where R'=Bir, then the sender may use this commitment C or Hash(C) as the destination key for the output and packs the (R,i) somewhere into the transaction. This improved stealth address scheme makes it possible to manage multiple stealth addresses in one wallet, therefore the user is able to share different addresses for different senders.

Main Contents

Introduction (including the related works intro), new stealth address scheme description, and two possible applications including applying it in Mimblewimble transaction.

Fig.1

fig-2

fig-3

fig-4

fig-5

Description

https://eprint.iacr.org/2020/548.pdf