TY - GEN
T1 - PDKSAP
T2 - 2020 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2020
AU - Feng, Cong
AU - Tan, Liang
AU - Xiao, Huan
AU - Yu, Keping
AU - Qi, Xin
AU - Wen, Zheng
AU - Jiang, You
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/8
Y1 - 2020/8
N2 - The stealth address protocol is to create a one-time temporary output address of a transaction, hide its real output address, destroy the association between the input address and the real output address to achieve privacy protection for user identities in the transaction. However, the widely used double-key stealth address protocol (DKSAP) requires the sender to transmit the temporary public key along with the transaction, which enables attackers to easily identify stealth and non-stealth transactions and can lead to the loss of some private information. We propose a double-key stealth address protocol without temporary key leakage - PDKSAP by which senders and receivers maintain local transaction record databases to record the number of transactions with other users. Senders and receivers generate a temporary key pair for a transaction based on the number of transactions between them, which prevent leaking the transaction temporary key. Finally, we verify the protocol through experiments.
AB - The stealth address protocol is to create a one-time temporary output address of a transaction, hide its real output address, destroy the association between the input address and the real output address to achieve privacy protection for user identities in the transaction. However, the widely used double-key stealth address protocol (DKSAP) requires the sender to transmit the temporary public key along with the transaction, which enables attackers to easily identify stealth and non-stealth transactions and can lead to the loss of some private information. We propose a double-key stealth address protocol without temporary key leakage - PDKSAP by which senders and receivers maintain local transaction record databases to record the number of transactions with other users. Senders and receivers generate a temporary key pair for a transaction based on the number of transactions between them, which prevent leaking the transaction temporary key. Finally, we verify the protocol through experiments.
KW - Blockchain
KW - Elliptic curve cryptography
KW - Privacy protection
KW - Stealth address protocol
UR - http://www.scopus.com/inward/record.url?scp=85093970699&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85093970699&partnerID=8YFLogxK
U2 - 10.1109/ICCCWorkshops49972.2020.9209929
DO - 10.1109/ICCCWorkshops49972.2020.9209929
M3 - Conference contribution
AN - SCOPUS:85093970699
T3 - 2020 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2020
SP - 151
EP - 155
BT - 2020 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 9 August 2020 through 11 August 2020
ER -