0x0.ai: Whitepaper v2
  • 0x0.ai: AI Smart Contract Auditor
    • ๐Ÿ‘€Overview
    • ๐Ÿ“ˆTokenomics
    • ๐Ÿ“Thesis
    • ๐Ÿ”ฎVision
  • 0x0 Ecosystem
    • ๐Ÿ”ŽAI Smart Contract Auditor
    • Arcane Privacy Wallet
      • Moving assets Anonymously
      • Calculating the Shared Secret
      • Creating the View Tag
      • Deriving the Stealth Public Key
      • Identifying Relevant Transactions for Wallets
      • Accessing Privately Transferred Assets
      • Arcane Contract
      • Shielding Assets
      • Single Transfers
      • Multiple Transfers
      • Withdrawal or Unshielding
      • Relayers
    • ๐Ÿ‘ปSpectre (Coming Soon)
  • 0x0 Income Sources
    • ๐Ÿ”ฅBuybacks and Burns
    • ๐Ÿ’ฐETH Rewards
  • Upcoming Plans
    • ๐Ÿ“†Roadmap
    • ๐Ÿ†•Dapp Updates
    • ๐Ÿ‘‚Community Feedback
Powered by GitBook
On this page
  1. 0x0 Ecosystem
  2. Arcane Privacy Wallet

Moving assets Anonymously

PreviousArcane Privacy WalletNextCalculating the Shared Secret

Last updated 5 months ago

In this setup, Bob wants to send an asset like ETH or an ERC20 token to Alice without revealing her wallet details. For this to happen, Alice provides her stealthAddress in the form 0x0<spk>.<vpk>, where spk represents the signing public key and vpk the viewing public key. This unique address enables Alice to receive assets anonymously.

After Bob transfers the asset to Aliceโ€™s stealth address, Alice remains unaware of the transaction until Bob announces it. Bob must share key details that will help Alice locate and retrieve the transferred assets.

Required Announcement Details

Bob needs to provide Alice with the following data to identify the transaction:

  • Ephemeral Public Key: Used by Alice to compute a shared secret, confirming transaction authenticity.

  • View Tag: Alice matches this against computed tags to identify her transactions.

  • Token Address: Indicates the specific asset type Bob transferred to the stealth address.

To initiate a transaction, Bob uses Aliceโ€™s stealthAddress, containing her signing and viewing public keys. This process involves several cryptographic steps using elliptic curve cryptography.