1,073
edits
[checked revision] | [checked revision] |
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{{#seo: | {{#seo: | ||
|title= | |title= Hidden address | ||
|titlemode= append | |titlemode= append | ||
|keywords= | |keywords= Stealth address | ||
|description= | |description= Stealth address | ||
}} | }} | ||
<div class="mikio-article-content"> | <div class="mikio-article-content"><div class="mikio-article-content"> | ||
<div class="mikio-tags"> | <div class="mikio-tags"> | ||
</div> | </div> | ||
<span id="skrytyj_adres"></span> | <span id="skrytyj_adres"></span> | ||
= | = Stealth address = | ||
<div class="level1"> | <div class="level1"> | ||
[[File:Commoninfo-0_0rxbwardasnqpx9c..png|400px|class=mediacenter]] | [[File:Commoninfo-0_0rxbwardasnqpx9c..png|400px|class=mediacenter]] | ||
''' | '''Stealth Address is a privacy enhancement technology that protects the privacy of cryptocurrency recipients. ''' | ||
Standard transactions in the blockchain are "pseudo-anonymous", since all the details of transfers are visible in the public register. Transaction details are identified only by their blockchain addresses. This means that a "certain" address is associated with one person, who, in turn, is not unknown to the public. | |||
''' | '''However, there is a possibility of complete depersonalization of wallet owners.''' | ||
</div> | </div> | ||
<span id="istorija"></span> | <span id="istorija"></span> | ||
= | = History = | ||
<div class="level1"> | <div class="level1"> | ||
The simplest stealth address scheme was first developed in '2011'; it relied on the Diffie-Hellman Elliptic Curve Protocol (ECDH). To eliminate the design flaws of the first hidden addresses, the improved scheme was described in detail by Nicholas van Saberhagen "in 2013", and was later adapted by Peter Todd in the Bitcoin protocol "in 2014". | |||
''' | '''The stealth address mechanism uses a combination of different public and private keys, which are dynamic and intended for one-time use only.''' | ||
</div> | </div> | ||
<span id="raznovidnosti_protokolov_skrytyx_adresov"></span> | <span id="raznovidnosti_protokolov_skrytyx_adresov"></span> | ||
= | = Varieties of stealth address protocols = | ||
<div class="level1"> | <div class="level1"> | ||
<ol> | <ol> | ||
<li><div class="li"> | <li><div class="li"> | ||
Basic Stealth Address Protocol (BSAP). | |||
</div></li> | </div></li> | ||
<li><div class="li"> | <li><div class="li"> | ||
Improved Stealth Address Protocol (ISAP). | |||
</div></li> | </div></li> | ||
<li><div class="li"> | <li><div class="li"> | ||
Stealth Address Dual Key Protocol (DKSAP). | |||
</div></li></ol> | </div></li></ol> | ||
</div> | </div> | ||
<span id="princip_raboty"></span> | <span id="princip_raboty"></span> | ||
= | = Operation principle = | ||
<div class="level1"> | <div class="level1"> | ||
[[File:Commoninfo-image_2021-05-07_16_11_58.jpg|400px|class=mediacenter]] | [[File:Commoninfo-image_2021-05-07_16_11_58.jpg|400px|class=mediacenter]] | ||
''' | '''Stealth addresses require a random and one-time address from the sender for each transaction on behalf of the recipient, so that different payments made to the same recipient are not related.''' | ||
Alice holds five coins on a blockchain with the support of a hidden address. Alice has full control over her tokens as long as they are on her electronic wallet. If she wants to send coins to Bob, Bob will generate a transaction output that will tell the network that Alice is sending Bob five tokens. Now Bob becomes the rightful owner of five tokens. | |||
Alice's wallet will use Bob's public address by combining it with random data strings that are generated to output tokens to Bob's address. While other network users can see the transaction record, no one except Alice and Bob will know that the transaction took place between Alice and Bob. | |||
Using the private key of viewing his own wallet, Bob will be able to find a transaction on the blockchain and receive coins. Using a one-time private key corresponding to the one-time public key for the transaction, Bob will get the right to spend cryptocurrency. "'The addresses of the sender's or recipient's wallets are not published anywhere in this process.''' | |||
''' | '''Since these randomly generated one-time addresses are created for each transaction on behalf of the recipient, stealth addresses add an additional layer of privacy in the world of cryptocurrencies.''' | ||
</div> | </div> | ||
<div style="clear:both"> | <div style="clear:both"> | ||
</div> | </div> | ||
</div> | </div> | ||
[[Category:Commoninfo]] | [[Category:Commoninfo]] |
edits