Stealth address
Stealth Address is a privacy enhancement technology that protects the privacy of cryptocurrency recipients.
Standard transactions in the blockchain are "pseudo-anonymous", since all the details of transfers are visible in the public register. Transaction details are identified only by their blockchain addresses. This means that a "certain" address is associated with one person, who, in turn, is not unknown to the public.
However, there is a possibility of complete depersonalization of wallet owners.
History
The simplest stealth address scheme was first developed in '2011'; it relied on the Diffie-Hellman Elliptic Curve Protocol (ECDH). To eliminate the design flaws of the first hidden addresses, the improved scheme was described in detail by Nicholas van Saberhagen "in 2013", and was later adapted by Peter Todd in the Bitcoin protocol "in 2014".
The stealth address mechanism uses a combination of different public and private keys, which are dynamic and intended for one-time use only.
Varieties of stealth address protocols
Basic Stealth Address Protocol (BSAP).
Improved Stealth Address Protocol (ISAP).
Stealth Address Dual Key Protocol (DKSAP).
Operation principle
Stealth addresses require a random and one-time address from the sender for each transaction on behalf of the recipient, so that different payments made to the same recipient are not related.
Alice holds five coins on a blockchain with the support of a hidden address. Alice has full control over her tokens as long as they are on her electronic wallet. If she wants to send coins to Bob, Bob will generate a transaction output that will tell the network that Alice is sending Bob five tokens. Now Bob becomes the rightful owner of five tokens.
Alice's wallet will use Bob's public address by combining it with random data strings that are generated to output tokens to Bob's address. While other network users can see the transaction record, no one except Alice and Bob will know that the transaction took place between Alice and Bob.
Using the private key of viewing his own wallet, Bob will be able to find a transaction on the blockchain and receive coins. Using a one-time private key corresponding to the one-time public key for the transaction, Bob will get the right to spend cryptocurrency. "'The addresses of the sender's or recipient's wallets are not published anywhere in this process.
Since these randomly generated one-time addresses are created for each transaction on behalf of the recipient, stealth addresses add an additional layer of privacy in the world of cryptocurrencies.