Cointime

Download App
iOS & Android

What Is a Stealth Address? Vitalik’s Solution for Privacy on Ethereum

Vitalik Buterin, the co-founder of Ethereum, recently published an article discussing the addition of privacy to the Ethereum network through what is referred to as a Stealth Address. In his article, Buterin explains how a stealth address works and its potential to increase privacy for users on the Ethereum network. In this article, I explain how Stealth Addresses work in a basic manner using an example: Alice wants to send Bob 1.2 ETH.  

Why Are Stealth Addresses Needed?

The idea that public blockchains such as Ethereum and Bitcoin are private is a common misunderstanding; to be clear, public blockchains are not private. Public blockchains offer some form of privacy through pseudonymity in the form of wallet addresses. But you can think of the wallet address as a username; once someone pinpoints your username, they can see everything you’ve ever done with it.

Every interaction that a wallet address makes on-chain, including transactions, interactions with decentralized applications, purchases of NFTs, etc. are recorded and stored in a public manner that anyone with an Internet connection can view. Websites like Etherscan make viewing this information convenient. Applications like Dune Analytics make analyzing that information easy.

Without privacy protection, this information can quickly and easily be exploited without consent. An analogy would be your bank account. With existing online banking, your activity isn’t seen by anyone, even if they know the username you used to log in. With public blockchains, once someone knew your username (in this case, wallet address), they could see all of the subscriptions you have; they could see every time you make a purchase, where you made the purchase, and use that information to locate you, blackmail you, or exploit you in other ways. On-chain privacy solutions are quickly becoming a solution to protect web3 users worldwide. Recently, Vitalik Buterin has given this topic deeper thought and proposed his solution for the Ethereum ecosystem through what he refers to as Stealth Addresses.

Generating Keys to Create the Stealth Address

A Stealth Address must be generated by two participants: the person attempting to receive cryptocurrency privately (we’ll refer to this person as Bob) and the person attempting to send cryptocurrency privately (we’ll refer to this person as Alice). Bob generates

  1. a Spending Key, which is then used to generate
  2. a Stealth Meta-Address, a public address that anyone can see, but it is a master address that can be used to derive unlimited Stealth Addresses with partners like Alice.

To derive a Stealth Meta-Address unique to Bob and Alice, Alice will also need to generate some keys on her side. Alice generates two keys:

  1. an Ephemeral Private Key (a secret key only she knows) and
  2. a corresponding Ephemeral Public Key, which is similar to the Stealth Meta-Address in that anyone can see it.

The Ephemeral Public Key is generated from the Ephemeral Private Key, and it is like an Ethereum address being created through secret seed phrases. The Ephemeral Public Key is published to a public ledger that anyone can view. Ephemeral Keypairs (the private and public ephemeral key combinations) are only used once, so Alice would need to generate a new Ephemeral keypair if she wanted to transact with someone else like Charlie privately.

To summarize up to this point:

  1. Bob has generated a Spending Key (private), which he then uses to generate a Stealth Meta-Address (public).
  2. Alice has generated an Ephemeral Private Key (private), which she then uses to generate an Ephemeral Public Key (public).

So both Bob and Alice have their unique private key and public key. As a next step to generate the final Stealth Address, Bob and Alice share their public keys. Bob gives Alice his Stealth Meta-Address (public), which anyone can see. Alice combines Bob’s Stealth Meta-Address with the Ephemeral Private Key she created. That combination creates the Stealth Address. Alice can send 1.2 ETH to the new Stealth Address.

Accessing the Stealth Address

On Bob’s side, he must locate the Stealth Address that Alice generated and sent 1.2 ETH to. To do this, he must somehow recreate what Alice did (remember, Alice combined Bob’s Stealth Meta-Address with her Ephemeral Private Key). But there’s a problem: Bob doesn’t know Alice’s Ephemeral Private Key.

Using the cryptographic concept of Shared Secrets, Bob has another option: he can create the same Stealth Address (and control the cryptocurrency inside the stealth address with his Spending Key) using a different private/public key combination. Alice used Bob’s public address (the Stealth Meta-Address, which they both can see) with her private address (the Ephemeral Private Key, which only she can see). Bob can use his private address (the Spending Key, which only he can see) with Alice’s public address (the Ephemeral Public Key, which they both can see).

To find Alice’s Ephemeral Public Key, Bob goes through a list of all the existing Ephemeral Public Keys. For each Ephemeral Public Key he sees, he combines it with his Spending Key, and a resulting Stealth Address is created. Bob then checks the Stealth Address’s contents (the cryptocurrency that is available in the Stealth Address). In most cases, the Stealth Address generated with random Ephemeral Public Keys and Bob’s Spending Key should contain 0 ETH. But once Bob tries to combine his spending key with Alice’s Ephemeral Public Key, he should see that the resulting Stealth Address contains 1.2 ETH.

In practice, Bob doesn’t manually go through all existing Ephemeral Public Keys to find the right one. It’s done automatically by a computer, which takes much less time than a human to sort through and try all the combinations.

In conclusion, the proposal Vitalik Buterin published is a practical solution that can work on the Ethereum network to increase privacy for its users. Other projects like Manta Network use a zkAddress system + UTXOs to enable on-chain privacy. The stealth address system proposed by Buterin is a unique and promising solution for privacy on the Ethereum network. More importantly, it is a step in the right direction that leaders like Vitalik Buterin are thinking about innovation around on-chain privacy.

P.S. — the image of Bob and Alice are non-existent people, generated by This Person Does Not Exist.

https://kennymuli.medium.com/what-is-a-stealth-address-53eeb71b4295

Comments

All Comments

Recommended for you

  • BTC Breaks Through $69,000

    Market data shows that BTC has surpassed $69,000, currently priced at $69,010, with a 24-hour decline of 0.42%. The market is experiencing significant volatility, so please ensure proper risk management.

  • SEC Chair: Crypto 'Safe Harbor' Proposal Under White House Review, Formal Rules Expected Soon

    On April 7, Cointelegraph reported that Paul Atkins, Chairman of the U.S. Securities and Exchange Commission, stated that the cryptocurrency 'safe harbor' proposal has entered the White House review stage, with formal rules expected to be issued soon. The proposal includes a 'startup exemption' that allows crypto projects to raise funds without the need for immediate registration.

  • BTC Surpasses $70,000

    Market data shows that BTC has surpassed $70,000, currently priced at $70,003.25, with a 24-hour increase of 3.96%. The market is experiencing significant volatility, so please ensure proper risk management.

  • Iran Responds to the U.S. via Pakistan, Rejects Ceasefire, Emphasizes Need for Permanent End to War

    According to the Islamic Republic News Agency (IRNA): Iran has responded to the United States through Pakistan, rejecting a ceasefire and emphasizing the necessity for a permanent end to the war.

  • US Media: 45-Day Ceasefire Plan is Just One of Many Proposals

    According to US media reports on the 6th, a White House official stated that the 45-day ceasefire plan between the US and Iran is just one of the 'many proposals' currently under discussion. The official indicated that President Trump has not yet approved the plan, and US military actions against Iran are still ongoing. (Xinhua News Agency)

  • Trump Has Not Approved Ceasefire Plan

    On April 6, the White House stated that President Trump has not yet approved the ceasefire plan. The potential ceasefire proposal is just one of many ideas.

  • Strategy Increases BTC Holdings by 4,871 Last Week, Total Holdings Exceed 766,000

    On April 6, Strategy officially disclosed that last week it purchased 4,871 BTC at an average price of approximately $67,718, with a total expenditure of about $329.9 million. As of 2026, Strategy has accumulated a total of 766,970 BTC, with a total holding cost of approximately $58.02 billion, resulting in an average price of about $75,644 per coin.

  • Iran Launches 98th Wave of 'True Commitment-4' Offensive Against US Amphibious Assault Ship

    On April 6, the Public Relations Department of the Iranian Islamic Revolutionary Guard Corps announced that Iran has launched the 98th wave of the 'True Commitment-4' operation. The statement indicated that the naval forces of the Islamic Revolutionary Guard Corps used cruise missiles to strike the container ship SDN7, which belongs to the 'Zionist regime.' Following its destruction, a large fire broke out. Additionally, missiles targeted strategic centers in northern and southern Tel Aviv, Haifa, chemical enterprises and factories in Be'er Sheva, as well as military installations in Batehfael. The statement also mentioned that the US amphibious assault ship LHA7, carrying over 5,000 sailors and Marines, was hit by missiles and was forced to retreat to deep waters in the southern Indian Ocean after the offensive. Furthermore, the UAE-Israel joint drone production center and several aircraft stationed at Ali Salim base were also subjected to drone and missile strikes.

  • Vessel Traffic in the Strait of Hormuz Reaches Highest Level Since Early March

    On April 6, foreign media reported that traffic through the Strait of Hormuz has risen to its highest level since the onset of the Middle East conflict, as more countries have reached security passage agreements with Iran. Over the weekend, a total of 21 vessels passed through the waterway, marking the highest two-day total since traffic began to decline in early March. Although the current number of vessels is still far below pre-war levels (approximately 135 vessels), more countries have obtained passage permits. A senior crude oil analyst at Singapore's Kpler stated, 'Iran is strengthening its control over Hormuz while responding to requests from its partners. Passage still depends on Iran's willingness, and the situation could change at any time if the conflict escalates.' So far, most of the vessels granted passage appear to be following the routes indicated by Tehran, navigating close to the Iranian coast. However, more vessels are also beginning to choose to travel along the opposite shore.

  • Iran Calls U.S. 15-Point Plan 'Highly Ambitious and Illogical'

    April 6 - According to the Islamic Republic News Agency (IRNA), Iranian Foreign Ministry spokesman Ismail Baghaei stated that in the context of recent proposals to end the war, Tehran has finalized its demands but will only announce them at the appropriate time, emphasizing that Iran will not succumb to pressure. He said, 'A few days ago, they proposed some plans through intermediaries, and this U.S. plan, which contains 15 points, was conveyed through Pakistan and other friendly countries.' He added, 'Such proposals are highly ambitious, unusual, and illogical.' He stressed that Iran has its own framework. 'Based on our own interests and considerations, we have organized and formulated a series of demands that we have presented in the past and present.' He also denied that engaging with mediators indicates weakness. 'The fact that Iran quickly and courageously expressed its position on a proposal should not be seen as a sign of submission to the enemy.' (Jinshi)