all InfoSec news
Elliptic Curve Pairing Stealth Address Protocols
Feb. 28, 2024, 5:11 a.m. | Marija Mikic, Mihajlo Srbakoski
cs.CR updates on arXiv.org arxiv.org
Abstract: The protection of transactions privacy is extremely important for the user. With stealth address protocols (SAP), users can receive assets on stealth addresses that they do not link to their stealth meta-addresses. SAP can be generated using various cryptographic approaches. DKSAP uses elliptic curve multiplication and hashing of the resulting shared secret. Another approach is to use a bilinear mapping. The paper presents two SA protocols that use elliptic curve pairing as a cryptographic solution. …
address addresses arxiv assets can cryptographic cs.cr curve elliptic generated hashing important link meta privacy protection protocols sap stealth transactions
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Network Security Administrator
@ Peraton | United States
IT Security Engineer 2
@ Oracle | BENGALURU, KARNATAKA, India
Sr Cybersecurity Forensics Specialist
@ Health Care Service Corporation | Chicago (200 E. Randolph Street)
Security Engineer
@ Apple | Hyderabad, Telangana, India
Cyber GRC & Awareness Lead
@ Origin Energy | Adelaide, SA, AU, 5000
Senior Security Analyst
@ Prenuvo | Vancouver, British Columbia, Canada