Stealth address: Difference between revisions

From Decimal Wiki
Jump to navigation Jump to search
[checked revision][checked revision]
No edit summary
No edit summary
Line 1: Line 1:
{{#seo:
{{#seo:
                     |title= Hidden address
                     |title= Stealth address — Decimal Wiki
                     |titlemode= append  
                     |titlemode= append  
                     |keywords= Stealth address
                     |keywords= Stealth address, Hidden address
                     |description= Stealth address
                     |description= Hidden (stealth) address
                     }}
                     }}
<div class="mikio-article-content"><div class="mikio-article-content">
'''Stealth address''' is a privacy enhancement technology that protects the privacy of [[cryptocurrency]] recipients.
   
   
<div class="mikio-tags">
Standard [[transaction]]s in the [[blockchain]] are "pseudo-anonymous", since all the details of transfers are visible in the public register. Transaction details are identified only by their [[blockchain address|blockchain addresses]]. This means that a "certain" address is associated with one person, who, in turn, is not unknown to the public.
 
 
</div>
<span id="skrytyj_adres"></span>
= Stealth address =
   
   
<div class="level1">
'''However, there is a possibility of complete depersonalization of [[wallet]] owners.'''
   
   
[[File:Commoninfo-0_0rxbwardasnqpx9c..png|400px|class=mediacenter]]
== History ==
The simplest stealth address scheme was first developed in 2011; it relied on the [[ECDH|Diffie-Hellman Elliptic Curve Protocol (ECDH)]]. To eliminate the design flaws of the first hidden addresses, the improved scheme was described in detail by [[wikipedia:Nicholas van Saberhagen|Nicholas van Saberhagen]] in 2013, and was later adapted by [[wikipedia:Peter Todd|Peter Todd]] in the [[Bitcoin]] protocol in 2014.
   
   
'''Stealth Address is a privacy enhancement technology that protects the privacy of cryptocurrency recipients. '''
'''The stealth address mechanism uses a combination of different [[public key|public]] and [[private key|private keys]], which are dynamic and intended for one-time use only.'''
   
   
Standard transactions in the blockchain are "pseudo-anonymous", since all the details of transfers are visible in the public register. Transaction details are identified only by their blockchain addresses. This means that a "certain" address is associated with one person, who, in turn, is not unknown to the public.
== Varieties of stealth address protocols ==
* Basic Stealth Address Protocol ([[BSAP]]).
* Improved Stealth Address Protocol ([[ISAP]]).
* Stealth Address Dual Key Protocol ([[DKSAP]]).
   
   
'''However, there is a possibility of complete depersonalization of wallet owners.'''
== Operation principle ==
[[File:Commoninfo-image_2021-05-07_16_11_58.jpg|500px|thumb|right]]
   
   
</div>
''Stealth addresses require a random and one-time address from the sender for each transaction on behalf of the recipient, so that different payments made to the same recipient are not related.''
<span id="istorija"></span>
 
'''Example:'''
= History =
<div class="level1">
The simplest stealth address scheme was first developed in '2011'; it relied on the Diffie-Hellman Elliptic Curve Protocol (ECDH). To eliminate the design flaws of the first hidden addresses, the improved scheme was described in detail by Nicholas van Saberhagen "in 2013", and was later adapted by Peter Todd in the Bitcoin protocol "in 2014".
'''The stealth address mechanism uses a combination of different public and private keys, which are dynamic and intended for one-time use only.'''
</div>
<span id="raznovidnosti_protokolov_skrytyx_adresov"></span>
= Varieties of stealth address protocols =
<div class="level1">
<ol>
<li><div class="li">
   
   
Basic Stealth Address Protocol (BSAP).
Alice holds five coins on a blockchain with the support of a hidden address. Alice has full control over her [[token]]s as long as they are on her [[electronic wallet]]. If she wants to send [[coin]]s to Bob, Bob will generate a [[transaction]] output that will tell the [[network]] that Alice is sending Bob five tokens. Now Bob becomes the rightful owner of five tokens.
   
   
</div></li>
Alice's wallet will use Bob's [[public address]] by combining it with random data strings that are generated to output tokens to Bob's address. While other network users can see the transaction record, no one except Alice and Bob will know that the transaction took place between Alice and Bob.
<li><div class="li">
   
   
Improved Stealth Address Protocol (ISAP).
Using the private key of viewing his own wallet, Bob will be able to find a transaction on the blockchain and receive [[coin]]s. Using a one-time private key corresponding to the one-time public key for the transaction, Bob will get the right to spend cryptocurrency. '''The addresses of the sender's or recipient's wallets are not published anywhere in this process.'''
   
   
</div></li>
''Since these randomly generated one-time addresses are created for each transaction on behalf of the recipient, stealth addresses add an additional layer of privacy in the world of cryptocurrencies.''
<li><div class="li">
Stealth Address Dual Key Protocol (DKSAP).
</div></li></ol>
</div>
<span id="princip_raboty"></span>
= Operation principle =
<div class="level1">
[[File:Commoninfo-image_2021-05-07_16_11_58.jpg|400px|class=mediacenter]]
'''Stealth addresses require a random and one-time address from the sender for each transaction on behalf of the recipient, so that different payments made to the same recipient are not related.'''
Alice holds five coins on a blockchain with the support of a hidden address. Alice has full control over her tokens as long as they are on her electronic wallet. If she wants to send coins to Bob, Bob will generate a transaction output that will tell the network that Alice is sending Bob five tokens. Now Bob becomes the rightful owner of five tokens.
Alice's wallet will use Bob's public address by combining it with random data strings that are generated to output tokens to Bob's address. While other network users can see the transaction record, no one except Alice and Bob will know that the transaction took place between Alice and Bob.
Using the private key of viewing his own wallet, Bob will be able to find a transaction on the blockchain and receive coins. Using a one-time private key corresponding to the one-time public key for the transaction, Bob will get the right to spend cryptocurrency. "'The addresses of the sender's or recipient's wallets are not published anywhere in this process.'''
'''Since these randomly generated one-time addresses are created for each transaction on behalf of the recipient, stealth addresses add an additional layer of privacy in the world of cryptocurrencies.'''
</div>
<div style="clear:both">
 
 
</div>
   
   
</div>
[[Category:Commoninfo]]
[[Category:Commoninfo]]
[[Category:Crypto security]]

Revision as of 08:53, 15 February 2024

Stealth address is a privacy enhancement technology that protects the privacy of cryptocurrency recipients.

Standard transactions in the blockchain are "pseudo-anonymous", since all the details of transfers are visible in the public register. Transaction details are identified only by their blockchain addresses. This means that a "certain" address is associated with one person, who, in turn, is not unknown to the public.

However, there is a possibility of complete depersonalization of wallet owners.

History

The simplest stealth address scheme was first developed in 2011; it relied on the Diffie-Hellman Elliptic Curve Protocol (ECDH). To eliminate the design flaws of the first hidden addresses, the improved scheme was described in detail by Nicholas van Saberhagen in 2013, and was later adapted by Peter Todd in the Bitcoin protocol in 2014.

The stealth address mechanism uses a combination of different public and private keys, which are dynamic and intended for one-time use only.

Varieties of stealth address protocols

  • Basic Stealth Address Protocol (BSAP).
  • Improved Stealth Address Protocol (ISAP).
  • Stealth Address Dual Key Protocol (DKSAP).

Operation principle

Stealth addresses require a random and one-time address from the sender for each transaction on behalf of the recipient, so that different payments made to the same recipient are not related.

Example:

Alice holds five coins on a blockchain with the support of a hidden address. Alice has full control over her tokens as long as they are on her electronic wallet. If she wants to send coins to Bob, Bob will generate a transaction output that will tell the network that Alice is sending Bob five tokens. Now Bob becomes the rightful owner of five tokens.

Alice's wallet will use Bob's public address by combining it with random data strings that are generated to output tokens to Bob's address. While other network users can see the transaction record, no one except Alice and Bob will know that the transaction took place between Alice and Bob.

Using the private key of viewing his own wallet, Bob will be able to find a transaction on the blockchain and receive coins. Using a one-time private key corresponding to the one-time public key for the transaction, Bob will get the right to spend cryptocurrency. The addresses of the sender's or recipient's wallets are not published anywhere in this process.

Since these randomly generated one-time addresses are created for each transaction on behalf of the recipient, stealth addresses add an additional layer of privacy in the world of cryptocurrencies.