Paper 2025/112
Post-Quantum Stealth Address Protocols
Abstract
The Stealth Address Protocol (SAP) allows users to receive assets through stealth addresses that are unlinkable to their stealth meta-addresses. The most widely used SAP, Dual-Key SAP (DKSAP), and the most performant SAP, Elliptic Curve Pairing Dual-Key SAP (ECPDKSAP), are based on elliptic curve cryptography, which is vulnerable to quantum attacks. These protocols depend on the elliptic curve discrete logarithm problem, which could be efficiently solved on a sufficiently powerful quantum computer using the Shor algorithm. In this paper three novel post-quantum SAPs based on lattice-based cryptography are presented: LWE SAP, Ring-LWE SAP and Module-LWE SAP. These protocols leverage Learning With Errors (LWE) problem to ensure quantum-resistant privacy. Among them, Module-LWE SAP, which is based on the Kyber key encapsulation mechanism, achieves the best performance and outperforms ECPDKSAP by approximately 66.8% in the scan time of the ephemeral public key registry.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- Blockchainprivacystealth addresslattice-based cryptographylearning with errorsKyber
- Contact author(s)
-
marija d mikic @ gmail com
srbakoski998 @ gmail com
strahinja praska6 @ gmail com - History
- 2025-01-24: approved
- 2025-01-23: received
- See all versions
- Short URL
- https://ia.cr/2025/112
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/112, author = {Marija Mikić and Mihajlo Srbakoski and Strahinja Praška}, title = {Post-Quantum Stealth Address Protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/112}, year = {2025}, url = {https://eprint.iacr.org/2025/112} }