Stealth addresses allow and require the sender to create random one-time addresses for every transaction on behalf of the recipient. The recipient can publish just one address, yet have all incoming payments go to unique addresses on the blockchain so that only the sender and receiver can determine where a payment was sent making transactions unlinkable
Questions tagged [stealth-address]
48 questions
18
votes
3 answers
What is a stealth address?
Canonical question on stealth addresses: They are mentioned in the context of privacy of Bitcoin transactions but are also implemented in Cryptonote based currencies. What are they and how would they work? Can they provide 100% anonymity?
q9f
- 685
- 3
- 10
- 26
13
votes
2 answers
Mandatory vs optional stealth address use
Use of stealth address is optional with Bitcoin and mandatory with Monero.
What are the advantages and disadvantages of mandating the use of stealth addresses?
Smart Kid
- 6,583
- 2
- 37
- 63
12
votes
3 answers
Constructing a Stealth Monero Address?
Is it possible from Section 4. Address Serialization cns007.txt and Section 3. Variable-Length Encoding of Integers cns003.txt to compute a Monero Stealth Address from the following?
1) Private Spend…
skaht
- 1,576
- 11
- 19
10
votes
3 answers
What's the point of ring signatures if stealth addresses hide the actual addresses anyways?
I understand generally how ring signatures work, but I also realize they are sent to and from stealth addresses, and so I'm curious why ring signatures are needed in the first place. Doesn't a sender's stealth address make the transaction…
user4
8
votes
2 answers
Terminology clarification: stealth address
I've seen the term stealth address being used for both:
Monero standard address
One-time public key
I'm guilty of using the term for 2. initially, but later I realized that it may actually refer to 1. and went on to correct some of my posts…
JollyMort
- 20,004
- 3
- 49
- 105
8
votes
3 answers
Examples of real stealth address from the blockchain
I am looking for examples of stealth addresses. Not only theoretically what they are, but real examples. What do they look like in the blockchain?
StackUser
- 83
- 3
7
votes
1 answer
Stealth addresses: where do they come from?
I wonder what the origin of stealth addresses is.
I learned that they were introduced for BitCoin, by Peter Todd. However, I cannot find any literature describing or analysing the specific instantiation in Monero:
P=H_s(rA)G + B
x=H_s(aR) + b
Does…
rubdos
- 307
- 1
- 6
7
votes
3 answers
Does publishing view key and key images give the auditor the information on where I sent the funds?
I see here that it's possible to provide information to an auditor to prove the balance at a certain point in time (block height). Would this tell the auditor to where were the funds were sent? Based on my understanding, the answer should be no - is…
JollyMort
- 20,004
- 3
- 49
- 105
6
votes
2 answers
If you send two transactions to the same one-time address, will they both be accepted by the blockchain?
A one time address is supposed to be, well, used only once.
If you send two transactions to the same one time address, will both transactions be accepted into the block chain? I know that if they were, only one would be spendable.
Christopher King
- 3,120
- 14
- 65
5
votes
1 answer
What are the differences between integrated and stealth addresses?
I'm confused what are stealth addresses. Can someone ELI5 what stealth addresses are, how they are generated and used?
user312
5
votes
1 answer
Preventing reuse of a stealth address
From https://monero.stackexchange.com/a/4169/4112, from a question asking whether one-time addresses can be reused:
Secondly, and this is even worse in my opinion, sending to the same stealth address will "burn" all outputs except one.
This makes…
rubdos
- 307
- 1
- 6
5
votes
1 answer
Why does the stealth address involve a hash function?
According to the cryptonote white paper, a stealth address of the form P = H_s(rA)G + B. My question is, why is the hash function necessary? It seems that P=rA + B would work just as well. Using a hash function makes scanning the blockchain for your…
Christopher King
- 3,120
- 14
- 65
4
votes
1 answer
Using exponentiations instead of ECC multiplication in computing Stealth address
I'm developing a variant of Monero.
Is it possible to change the ECC multiplication rA with r^A of the stealth address term Hs(rA)G+B.
And of course also the multiplication by G.
IMHO it should be interchangble but I want to be sure.
What other…
user1387682
- 367
- 1
- 5
4
votes
1 answer
Stealth address, is there a static part at the end?
If I understand things correctly from the whitepaper in order for Alice to send me monero she will use my two public keys A (public view key) and B (public spend key) which she gets from my address (A,B).
In order to generate the stealth address she…
user3017
- 43
- 2
4
votes
2 answers
Total Amount Of Monero Wallets
Is there currently a way in which to view the total amount of Wallets that have been created for Monero and deposited too?
and/or an estimate located anywhere as to the total amount of wallets created and/or the average quantity of monero inside the…
Lurker
- 473
- 2
- 10