Moving assets Anonymously
Last updated
Last updated
In this setup, Bob wants to send an asset like ETH or an ERC20 token to Alice without revealing her wallet details. For this to happen, Alice provides her stealthAddress
in the form 0x0<spk>.<vpk>
, where spk
represents the signing public key and vpk
the viewing public key. This unique address enables Alice to receive assets anonymously.
After Bob transfers the asset to Alice’s stealth address, Alice remains unaware of the transaction until Bob announces it. Bob must share key details that will help Alice locate and retrieve the transferred assets.
Bob needs to provide Alice with the following data to identify the transaction:
Ephemeral Public Key: Used by Alice to compute a shared secret, confirming transaction authenticity.
View Tag: Alice matches this against computed tags to identify her transactions.
Token Address: Indicates the specific asset type Bob transferred to the stealth address.
To initiate a transaction, Bob uses Alice’s stealthAddress
, containing her signing and viewing public keys. This process involves several cryptographic steps using elliptic curve cryptography.