Hasty Briefsbeta

How stealth addresses work in Monero

17 days ago
  • #Cryptography
  • #Monero
  • #Privacy
  • Alice runs a confidential restaurant and accepts Monero for payments.
  • Bob uses Alice's public view key (A) and spend key (S) to generate a stealth address (P) for the transaction.
  • Bob's software computes a shared secret (k) using elliptic curve Diffie-Hellman (ECDH) with Alice's view key.
  • Alice can derive the same shared secret (k) using her private view key (a) and the point R provided by Bob.
  • Alice scans the blockchain for payments to the stealth address (P = kG + S), which only she can spend using her private spend key (s).
  • Monero's ring signatures ensure privacy by making it difficult to link transactions to specific individuals.