skip to main content
10.1145/3321408.3321573acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-turcConference Proceedingsconference-collections
research-article

A new stealth address scheme for blockchain

Published: 17 May 2019 Publication History

Abstract

Stealth address has been an effective way to protect privacy of users in blockchain. However, most of the existing schemes either require their users to bear extra storage costs to manage keys, or need one more private communication before each transaction. To overcome these drawbacks, we proposed a new kind of stealth addresses scheme in which a user only needs to keep a single key pair for initial certificate, the user only stores his or her initial key pair for all transactions. In our scheme, when a sender initiates a transaction, he or she creates a one-time transaction address, then the sender attaches it to the transaction. The receiver uses his or her private key to check the transaction from the blockchain, no private channel is needed for each transaction. Considering regulatory issues, transactions can be wholly or partially regulated, depending on security requirements. Finally, we provide provable security analysis to ensure the security of our scheme, and our simulation results show that our scheme is also efficient and practical in computation.

References

[1]
Pieter W. Bip32: Hierarchical Deterministic Wallets. HYPERLINK https://github.com/bitcoin/bips/blob/master/bip0032.mediawiki, 2013.
[2]
Nicolas van S. Cryptonote v2.0. HYPERLINK https://cryptonote.org/whitepaper.pdf, 2013.
[3]
Sasson E B, Chiesa A, Garman C, et al. Zerocash: Decentralized Anonymous Payments from Bitcoin{C}// Security and Privacy. IEEE, 2014.
[4]
HyperLedger Fabric. https://www.hyperledger.org/.
[5]
Menero. https://www.getmonero.org/.
[6]
Satoshi N. Bitcoin: a peer-to-peer electronic cash system, 2009. URL: http://www.bitcoin.org/bitcoin.pdf.
[7]
Nystrom M. Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512{J}. Heise Zeitschriften Verlag, 2005.
[8]
Noether S. Ring Signature Confidential Transactions for Monero. Cryptology ePrint Archive, Report 2015/1098, 2015. http://eprint.iacr.org/.
[9]
Galbraith S D, Paterson K G, and Nigel P. Smart. Pairings for cryptographers. Discrete Applied Mathematics, 156(16):3113--3121, 2008.
[10]
Boneh D, Franklin M. (2001) Identity-Based Encryption from the Weil Pairing. In: Kilian J. (eds) Advances in Cryptology - CRYPTO 2001. CRYPTO 2001. Lecture Notes in Computer Science, vol 2139. Springer, Berlin, Heidelberg, 2001.
[11]
Yang D, Gavigan J, Wilcox-O'Hearn Z. Survey of Confidentiality and Privacy Preserving Technologies for Blockchains. R3 Research, R3 confidential and Privacy Report, November 14, 2016.
[12]
Uzunkol O, Sab1rKirazb M, Still wrong use of pairings in cryptography, Applied Mathematics and Computation, Volume 333, Pages 467--479, 15 September 2018.

Cited By

View all
  • (2024)Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note MechanismApplied Sciences10.3390/app1404164214:4(1642)Online publication date: 18-Feb-2024
  • (2024)BaseSAP: Modular Stealth Address Protocol for Programmable BlockchainsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336408119(3539-3553)Online publication date: 8-Feb-2024
  • (2024)A Distributed Stealth Address Generation Protocol for Threshold Signatures2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA)10.1109/ISPA63168.2024.00275(2014-2021)Online publication date: 30-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACM TURC '19: Proceedings of the ACM Turing Celebration Conference - China
May 2019
963 pages
ISBN:9781450371582
DOI:10.1145/3321408
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blockchain
  2. privacy
  3. regulation
  4. stealth address
  5. traceability

Qualifiers

  • Research-article

Conference

ACM TURC 2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)22
  • Downloads (Last 6 weeks)5
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note MechanismApplied Sciences10.3390/app1404164214:4(1642)Online publication date: 18-Feb-2024
  • (2024)BaseSAP: Modular Stealth Address Protocol for Programmable BlockchainsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336408119(3539-3553)Online publication date: 8-Feb-2024
  • (2024)A Distributed Stealth Address Generation Protocol for Threshold Signatures2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA)10.1109/ISPA63168.2024.00275(2014-2021)Online publication date: 30-Oct-2024
  • (2024)CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryptionFuture Generation Computer Systems10.1016/j.future.2024.03.016Online publication date: Mar-2024
  • (2023)EFPB: Efficient Fair Payment Based on Blockchain for Outsourcing Services in Cloud ComputingIEEE Access10.1109/ACCESS.2023.326156011(30118-30128)Online publication date: 2023
  • (2022)Sender Anonymity: Applying Ring Signature in Gateway-based Blockchain for IoT Is Not EnoughInformation Sciences10.1016/j.ins.2022.05.054Online publication date: May-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media