Cointime

Download App
iOS & Android

What Is a Stealth Address? Vitalik’s Solution for Privacy on Ethereum

Vitalik Buterin, the co-founder of Ethereum, recently published an article discussing the addition of privacy to the Ethereum network through what is referred to as a Stealth Address. In his article, Buterin explains how a stealth address works and its potential to increase privacy for users on the Ethereum network. In this article, I explain how Stealth Addresses work in a basic manner using an example: Alice wants to send Bob 1.2 ETH.  

Why Are Stealth Addresses Needed?

The idea that public blockchains such as Ethereum and Bitcoin are private is a common misunderstanding; to be clear, public blockchains are not private. Public blockchains offer some form of privacy through pseudonymity in the form of wallet addresses. But you can think of the wallet address as a username; once someone pinpoints your username, they can see everything you’ve ever done with it.

Every interaction that a wallet address makes on-chain, including transactions, interactions with decentralized applications, purchases of NFTs, etc. are recorded and stored in a public manner that anyone with an Internet connection can view. Websites like Etherscan make viewing this information convenient. Applications like Dune Analytics make analyzing that information easy.

Without privacy protection, this information can quickly and easily be exploited without consent. An analogy would be your bank account. With existing online banking, your activity isn’t seen by anyone, even if they know the username you used to log in. With public blockchains, once someone knew your username (in this case, wallet address), they could see all of the subscriptions you have; they could see every time you make a purchase, where you made the purchase, and use that information to locate you, blackmail you, or exploit you in other ways. On-chain privacy solutions are quickly becoming a solution to protect web3 users worldwide. Recently, Vitalik Buterin has given this topic deeper thought and proposed his solution for the Ethereum ecosystem through what he refers to as Stealth Addresses.

Generating Keys to Create the Stealth Address

A Stealth Address must be generated by two participants: the person attempting to receive cryptocurrency privately (we’ll refer to this person as Bob) and the person attempting to send cryptocurrency privately (we’ll refer to this person as Alice). Bob generates

  1. a Spending Key, which is then used to generate
  2. a Stealth Meta-Address, a public address that anyone can see, but it is a master address that can be used to derive unlimited Stealth Addresses with partners like Alice.

To derive a Stealth Meta-Address unique to Bob and Alice, Alice will also need to generate some keys on her side. Alice generates two keys:

  1. an Ephemeral Private Key (a secret key only she knows) and
  2. a corresponding Ephemeral Public Key, which is similar to the Stealth Meta-Address in that anyone can see it.

The Ephemeral Public Key is generated from the Ephemeral Private Key, and it is like an Ethereum address being created through secret seed phrases. The Ephemeral Public Key is published to a public ledger that anyone can view. Ephemeral Keypairs (the private and public ephemeral key combinations) are only used once, so Alice would need to generate a new Ephemeral keypair if she wanted to transact with someone else like Charlie privately.

To summarize up to this point:

  1. Bob has generated a Spending Key (private), which he then uses to generate a Stealth Meta-Address (public).
  2. Alice has generated an Ephemeral Private Key (private), which she then uses to generate an Ephemeral Public Key (public).

So both Bob and Alice have their unique private key and public key. As a next step to generate the final Stealth Address, Bob and Alice share their public keys. Bob gives Alice his Stealth Meta-Address (public), which anyone can see. Alice combines Bob’s Stealth Meta-Address with the Ephemeral Private Key she created. That combination creates the Stealth Address. Alice can send 1.2 ETH to the new Stealth Address.

Accessing the Stealth Address

On Bob’s side, he must locate the Stealth Address that Alice generated and sent 1.2 ETH to. To do this, he must somehow recreate what Alice did (remember, Alice combined Bob’s Stealth Meta-Address with her Ephemeral Private Key). But there’s a problem: Bob doesn’t know Alice’s Ephemeral Private Key.

Using the cryptographic concept of Shared Secrets, Bob has another option: he can create the same Stealth Address (and control the cryptocurrency inside the stealth address with his Spending Key) using a different private/public key combination. Alice used Bob’s public address (the Stealth Meta-Address, which they both can see) with her private address (the Ephemeral Private Key, which only she can see). Bob can use his private address (the Spending Key, which only he can see) with Alice’s public address (the Ephemeral Public Key, which they both can see).

To find Alice’s Ephemeral Public Key, Bob goes through a list of all the existing Ephemeral Public Keys. For each Ephemeral Public Key he sees, he combines it with his Spending Key, and a resulting Stealth Address is created. Bob then checks the Stealth Address’s contents (the cryptocurrency that is available in the Stealth Address). In most cases, the Stealth Address generated with random Ephemeral Public Keys and Bob’s Spending Key should contain 0 ETH. But once Bob tries to combine his spending key with Alice’s Ephemeral Public Key, he should see that the resulting Stealth Address contains 1.2 ETH.

In practice, Bob doesn’t manually go through all existing Ephemeral Public Keys to find the right one. It’s done automatically by a computer, which takes much less time than a human to sort through and try all the combinations.

In conclusion, the proposal Vitalik Buterin published is a practical solution that can work on the Ethereum network to increase privacy for its users. Other projects like Manta Network use a zkAddress system + UTXOs to enable on-chain privacy. The stealth address system proposed by Buterin is a unique and promising solution for privacy on the Ethereum network. More importantly, it is a step in the right direction that leaders like Vitalik Buterin are thinking about innovation around on-chain privacy.

P.S. — the image of Bob and Alice are non-existent people, generated by This Person Does Not Exist.

https://kennymuli.medium.com/what-is-a-stealth-address-53eeb71b4295

Comments

All Comments

Recommended for you

  • Bank of Japan to Maintain Interest Rates in April

    On April 21, according to Nikkei News: The Bank of Japan will maintain interest rates unchanged in April.

  • Iranian Military: Ready to Respond Decisively to 'Enemy's Breach of Promises'

    On April 21, local time, Abdollahi, commander of the Khatam al-Anbiya Central Command of the Iranian Armed Forces, stated that Iran is prepared to respond decisively to the 'enemy's breach of promises.' Abdollahi emphasized that the current Iranian military possesses 'authority, readiness, and comprehensive strategic capabilities.' He noted that the Islamic Revolutionary Guard Corps and other defense forces have demonstrated combat capabilities in relevant operations, putting 'Israel and the United States in a difficult and fatigued position,' forcing them to 'seek a ceasefire.' Abdollahi also stressed that the Iranian armed forces maintain a high level of unity with the government and the people under the supreme leader's unified command, and will respond 'decisively, resolutely, and promptly' to any threats and actions. (CCTV News)

  • Another Iranian Oil Tanker Returns to Iran After Breaking US Blockade

    On April 21, according to CCTV News, maritime intelligence company 'TankerTrackers' reported that a tanker belonging to the National Iranian Tanker Company returned to Iran after unloading approximately 2 million barrels of crude oil in Indonesia, crossing the relevant maritime blockade line. The tanker is currently en route to Iran's main oil export hub, Khark Island, and is expected to arrive on April 22 local time. It is reported that the tanker set sail from Iran in late March, heading towards the Riau Islands of Indonesia.

  • White House: US and Iran on the Verge of Reaching an Agreement

    On April 21, White House Press Secretary Kayleigh McEnany stated in an interview with Fox News on the evening of the 20th that the United States and Iran are on the "verge of reaching an agreement." McEnany remarked, "The US has never been closer to achieving a truly good deal." However, she did not disclose any information regarding the current status of the negotiations. McEnany noted that even if an agreement is not reached, President Trump has multiple options and is not afraid to utilize these measures. Previous actions have demonstrated that Trump is not just "bluffing."

  • Kelp DAO Attacker Transfers 30,800 ETH to Special Address

    On April 21, news emerged that, according to monitoring by PeckShield, the Kelp DAO attacker transferred 30,800 ETH to a special address starting with 0x00000, possibly indicating a destruction action.

  • Trump: 'Midnight Hammer' Completely Dismantled Iran's Nuclear Dust Base

    On April 21, U.S. President Trump stated that the 'Midnight Hammer' operation has completely destroyed the 'nuclear dust' base within Iran. As a result, the cleanup will be a long and arduous process. The fake news media, including CNN and other corrupt media networks and platforms, have failed to give our great pilots the credit they deserve, instead always attempting to belittle and undermine them. They are losers!!! (Dongxin News Agency)

  • BTC Drops Below $76,000

    Market data shows that BTC has dropped below $76,000, currently priced at $75,999.63, with a 24-hour increase of 1.68%. The market is experiencing significant volatility, so please ensure proper risk management.

  • Japan Officially Allows Export of Lethal Weapons Through Cabinet Resolution

    On April 21, according to Kyodo News, the Japanese government officially revised the 'Three Principles on Transfer of Defense Equipment' and its operational guidelines during a cabinet meeting, which will, in principle, allow the export of lethal weapons. (Xinhua News Agency)

  • Trump Claims Iran Will Negotiate

    On April 21, during a phone interview with CNN, U.S. President Trump stated that Iran "will negotiate" and expressed confidence in potential talks set to take place in Pakistan. Trump remarked, "They will negotiate; if they don't, they will face unprecedented problems." He also expressed hope that both sides could reach a "fair agreement" and emphasized that Iran "will not have nuclear weapons." Additionally, he defended military actions against Iran by stating there was "no choice" and claimed that they would ultimately "wrap things up."

  • Amazon to Invest Additional $5 Billion in Anthropic

    On April 21, Amazon announced on Monday that it will invest an additional $5 billion in the artificial intelligence company Anthropic, bringing the total investment to as much as $20 billion. Anthropic develops the Claude chatbot and programming tools, and plans to invest over $100 billion in Amazon's cloud technology and chips over the next decade.