Elliptic Curve Pairing Stealth Address Protocols

The protection of transactions privacy is extremely important for the user. With stealth address protocols (SAP), users can receive assets on stealth addresses that they do not link to their stealth meta-addresses. SAP can be generated using various cryptographic approaches. DKSAP uses elliptic curve multiplication and hashing of the resulting shared secret. Another approach is to use a bilinear mapping. The paper presents two SA protocols that use elliptic curve pairing as a cryptographic solution. ECPDKSAP is a pairing-based protocol that includes viewing key and spending key, while ECPSKSAP is a pairing-based protocol that uses a single key with which spending and the viewing key are derived. We obtain that ECPDKSAP has better results than DKSAP with the view tag. ECPSKSAP is significantly slower, but it represents an interesting theoretical result, because it uses only one private key.
View on arXiv