Why Privacy Matters in Crypto
Cash still dominates everyday transactions. The reason? Privacy and finality. Blockchain nailed finality. Once a transaction is confirmed, it’s permanent. But privacy? That’s where things get tricky. When Bob knows Alice’s wallet address, he can track every payment she makes. Everything is public, transparent, and traceable.The Good
Public transactions let us track malicious activity and investigate hacks
The Bad
Businesses can’t operate on-chain when competitors can monitor their
financial moves
How Stealth Addresses Work
Math notation guide: - Lowercase letters (p, r, s) = private keys -
Uppercase letters (P, R, S) = public keys -
· symbol = scalar multiplication
on elliptic curvesThe Basic Concept
Imagine Charles wants to send Alice some funds without anyone linking the transaction to her known address.He computes a one-time address
Charles multiplies Alice’s public key
P by his random number: P · r = P' (a brand new public key) He sends funds to the address derived
from P'The Enhanced Approach (EIP-5564)
The basic method has a problem: Alice needs to use her private key to scan for incoming payments. That’s risky. Following the EIP-5564 standard, Shakesco implements a safer approach using view and spending key pairs.How view and spending keys work
How view and spending keys work
Alice’s Setup:
- Generates two key pairs:
- View keys:
p_view(private) andP_view(public) - Spending keys:
p_spend(private) andP_spend(public)
- View keys:
- Makes both public keys available (
P_viewandP_spend)
- Generates random number
r - Computes stealth address from
P_spend · r - Encrypts
rusing ECDH with:- Alice’s
P_view(public view key) - His ephemeral private key
- Alice’s
- Sends funds to stealth address
- Publishes encrypted
rand ephemeral public key on-chain
- Uses her
p_view(private view key) with Charles’s ephemeral public key to decryptr - Computes potential private key:
p_spend · r - Derives address from this private key
- If address matches the stealth address → she owns the funds! 🎉
The Privacy Advantage
With stealth addresses:- ✅ Every payment goes to a unique, unlinkable address
- ✅ Only the sender and receiver know who’s involved
- ✅ Third parties can’t track transaction patterns
- ✅ Businesses can operate with financial privacy
- ✅ Blockchain transparency remains for fraud detection
Learn More
EIP-5564 Standard
Read the official Ethereum Improvement Proposal for stealth addresses
Umbra Protocol
Explore how Umbra implements stealth payments in production