PDKSAP: Perfected Double-Key Stealth Address Protocol without Temporary Key Leakage in Blockchain

Cong Feng, Liang Tan, Huan Xiao, Keping Yu, Xin Qi, Zheng Wen, You Jiang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The stealth address protocol is to create a one-time temporary output address of a transaction, hide its real output address, destroy the association between the input address and the real output address to achieve privacy protection for user identities in the transaction. However, the widely used double-key stealth address protocol (DKSAP) requires the sender to transmit the temporary public key along with the transaction, which enables attackers to easily identify stealth and non-stealth transactions and can lead to the loss of some private information. We propose a double-key stealth address protocol without temporary key leakage - PDKSAP by which senders and receivers maintain local transaction record databases to record the number of transactions with other users. Senders and receivers generate a temporary key pair for a transaction based on the number of transactions between them, which prevent leaking the transaction temporary key. Finally, we verify the protocol through experiments.

Original languageEnglish
Title of host publication2020 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages151-155
Number of pages5
ISBN (Electronic)9781728187556
DOIs
Publication statusPublished - 2020 Aug
Event2020 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2020 - Chongqing, China
Duration: 2020 Aug 92020 Aug 11

Publication series

Name2020 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2020

Conference

Conference2020 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2020
Country/TerritoryChina
CityChongqing
Period20/8/920/8/11

Keywords

  • Blockchain
  • Elliptic curve cryptography
  • Privacy protection
  • Stealth address protocol

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing
  • Health Informatics
  • Instrumentation

Fingerprint

Dive into the research topics of 'PDKSAP: Perfected Double-Key Stealth Address Protocol without Temporary Key Leakage in Blockchain'. Together they form a unique fingerprint.

Cite this