Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Stealth Address

A stealth address is a cryptographic privacy technique that generates a unique, one-time receiving address for each transaction, preventing blockchain observers from linking transactions to a recipient's master public address.
Chainscore © 2026
definition
PRIVACY TECHNOLOGY

What is a Stealth Address?

A stealth address is a cryptographic privacy mechanism that generates unique, one-time receiving addresses for each transaction to break the linkability of on-chain payments.

A stealth address is a cryptographic privacy-enhancing technology used in blockchain networks to obfuscate the recipient of a transaction. It allows a sender to generate a unique, one-time public address for a recipient using their published stealth meta-address, ensuring that multiple payments to the same entity appear to go to different, unlinked wallet addresses on the public ledger. This breaks the fundamental linkability of blockchain analysis, as observers cannot determine if two transactions were sent to the same person. The recipient, who holds the corresponding private keys, can scan the blockchain to detect and spend funds sent to any of their derived stealth addresses.

The core mechanism relies on elliptic curve cryptography and a Diffie-Hellman key exchange. The sender uses the recipient's stealth meta-address and a random secret value (the spending key) to compute a shared secret. This secret is then used to derive a unique, ephemeral public key (the stealth address) for that specific transaction. Only the intended recipient, who possesses the matching private view key and spend key, can compute the same shared secret and derive the corresponding private key for the stealth address to claim the funds. This process ensures that the relationship between the recipient's master identity and individual transactions remains hidden.

Stealth addresses are a critical component of privacy-preserving cryptocurrencies like Monero, which implements them as part of its core protocol. They are also proposed as an ERC (Ethereum Request for Comments) standard (e.g., ERC-5564) for bringing native stealth address functionality to Ethereum and other EVM-compatible chains. Unlike mixing services or coinjoin, stealth addresses provide privacy at the point of transaction initiation without requiring coordination with other users or trusted third parties, offering a form of sender-enforced privacy.

A key challenge with stealth addresses is the need for the recipient to perform blockchain scanning. Since the recipient does not know in advance which stealth addresses will be used, their wallet must cryptographically test every new transaction to see if it is intended for them. This can be computationally intensive, though optimizations like Diffie-Hellman key exchange tagging and the use of view keys mitigate the burden. The sender's random spending key must also be securely communicated to the recipient, often embedded within the transaction data or through an integrated address.

The adoption of stealth addresses enhances financial privacy by default, making it significantly harder for analysts to map transaction flows, determine balances, or infer social graphs from public blockchain data. When combined with other privacy technologies like confidential transactions (hiding amounts) and zk-SNARKs (hiding transaction logic), stealth addresses form a robust privacy suite. Their implementation represents a shift towards making privacy a programmable, native feature of blockchain networks rather than an optional add-on.

how-it-works
PRIVACY PROTOCOL

How Do Stealth Addresses Work?

A technical breakdown of the cryptographic mechanism that enables private, non-linkable transactions on public blockchains.

A stealth address is a privacy-enhancing cryptographic protocol that generates a unique, one-time destination address for each transaction on a public blockchain, preventing the public linking of a recipient's identity to their permanent wallet address. The system relies on elliptic curve cryptography where a sender uses the recipient's public stealth meta-address—a combination of their public spend and view keys—to derive a unique, unlinkable public key for the transaction. This process ensures that all funds sent to the same individual appear to go to completely different, unrelated addresses on the public ledger, breaking the common blockchain analysis heuristic of address reuse.

The core mechanism involves a Diffie-Hellman key exchange performed on-chain. The sender generates a random ephemeral key pair and uses it, along with the recipient's stealth meta-address, to compute a shared secret. This secret is then used to generate the unique, one-time public address where the funds are sent. Crucially, only the intended recipient, who possesses the corresponding private view key, can scan the blockchain, recognize transactions intended for them by recomputing the shared secret, and then derive the private key needed to spend from the one-time address using their private spend key.

For the recipient to discover their funds, they must perform a transaction scanning process. Using their private view key, they can compute the shared secret for every new transaction on the network without revealing their involvement. When a match is found, they can then derive the corresponding private key for the one-time address. This design elegantly separates discovery (view key) from spending authority (spend key), allowing for the delegation of scanning to a semi-trusted service without compromising the ability to spend assets.

A critical supporting component is the stealth address metadata or "hint," often published to the blockchain by the sender. This small piece of data, typically the ephemeral public key, allows the recipient to efficiently scan for their transactions without having to perform computationally intensive checks against every possible sender. Protocols like ERC-5564 on Ethereum aim to standardize this metadata format and the stealth address generation algorithm, promoting interoperability across wallets and applications seeking enhanced privacy.

The primary advantage of stealth addresses is unlinkability, as they eliminate the privacy leak caused by address reuse. However, they are often just one part of a larger privacy suite. For complete privacy, they may be combined with other technologies like confidential transactions (hiding amounts) and coin mixing or zk-SNARKs-based pools (breaking the link between sender and stealth address). Notable implementations and proposals include Monero's use of one-time addresses, the Silent Payments protocol for Bitcoin, and various Ethereum-based efforts following the ERC-5564 standard.

key-features
PRIVACY MECHANISM

Key Features of Stealth Addresses

Stealth addresses are a cryptographic privacy technique that enables a sender to generate a unique, one-time destination address for each transaction on a public blockchain, breaking the linkability of funds on-chain.

01

Unlinkable Transactions

The core function of a stealth address is to prevent on-chain linkability. For every payment, the sender generates a unique, one-time public address derived from the recipient's public stealth meta-address. This means multiple payments to the same recipient appear as unrelated transactions to different addresses on the blockchain, obscuring the recipient's total balance and transaction graph.

02

Dual-Key Cryptography

Stealth addresses rely on a dual-key system derived from Elliptic Curve Cryptography (typically secp256k1). A recipient has:

  • A spend private key to authorize spending from generated addresses.
  • A view private key to scan the blockchain for incoming payments. The sender uses the recipient's public stealth meta-address (containing two public keys) to perform the one-time address generation, ensuring only the intended recipient can find and spend the funds.
03

On-Chain Stealth Meta-Address

To receive a stealth payment, a user must first publish or share their stealth meta-address. This is a static identifier, often encoded as a single string (e.g., starting with 0x00 in some implementations), which contains the two public keys needed for the dual-key system. Unlike a regular address, the meta-address itself never receives funds; it is only used as the input to generate the unique, one-time destination addresses.

04

Requires Off-Chain Data (Announcement)

A critical component is the stealth meta-address announcement. For the recipient to discover their funds, the sender must publish a small piece of cryptographic data (an ephemeral public key or stealth address metadata) to the blockchain. The recipient's wallet scans these announcements using their view key to compute which one-time addresses belong to them. Without this public announcement, the recipient cannot find the transaction.

05

Protocol-Level vs. Application-Level

Implementation can occur at different layers:

  • Protocol-Level: Built directly into a blockchain's consensus rules (e.g., Monero's use of one-time addresses). All transactions are private by default.
  • Application-Level: Implemented via smart contracts or SDKs on transparent chains like Ethereum (e.g., ERC-5564). Privacy is an opt-in feature for users. This distinction affects adoption, gas costs, and the privacy set (the group of users whose transactions are mixed).
06

Interaction with Other Privacy Tech

Stealth addresses are often one component of a larger privacy stack. They are highly complementary to:

  • Confidential Transactions: Hides the transaction amount.
  • ZK-SNARKs / ZK-STARKs: Can prove the correctness of a stealth address operation without revealing links.
  • Mixing / CoinJoin: Breaks linkability between transactions, while stealth addresses break linkability to the recipient. Used together, they provide strong, multi-layered privacy.
ecosystem-usage
IMPLEMENTATIONS

Protocols & Ecosystems Using Stealth Addresses

Stealth addresses are a privacy-enhancing primitive implemented across various blockchain ecosystems, each with unique cryptographic approaches and integration levels.

06

Cardano (CIP-????)

The Cardano ecosystem is exploring stealth address standards through Cardano Improvement Proposals (CIPs). Proposed designs leverage the chain's extended UTXO (eUTXO) model and native asset support.

  • Focus on single-use addresses derived from a master public key and a nonce.
  • Aims for light-client compatibility, allowing wallets to scan for incoming transactions efficiently.
  • Discussions center on integrating with Hydra for scalability and off-chain announcement layers.
COMPARISON

Stealth Addresses vs. Other Privacy Techniques

A technical comparison of privacy-enhancing technologies by their core mechanism, privacy guarantees, and operational characteristics.

Feature / MetricStealth AddressesZero-Knowledge Rollups (ZK-Rollups)CoinJoin / Mixers

Primary Privacy Goal

Transaction graph obfuscation

Full transaction privacy

Fungibility & source obfuscation

Core Mechanism

Ephemeral, one-time recipient addresses

Validity proofs with off-chain computation

Peer-to-peer cooperative coin mixing

On-Chain Data Visibility

Transaction amounts visible, sender-receiver link hidden

Only validity proof and state root published

All inputs/outputs visible, linkability broken

Trust Assumption

Trustless (cryptographic guarantees)

Trustless (cryptographic proofs)

Trusted coordinator or decentralized, anonymous peers

Scalability Impact

Minimal on-chain footprint

High (batches many transactions)

Minimal to moderate

Typical Latency

Near-instant (single transaction)

Batch confirmation delay (~10 min to hours)

Variable, depends on pool liquidity

Implementation Example

Monero, Zcash (Sapling)

zkSync, StarkNet, Aztec

Wasabi Wallet, JoinMarket, Tornado Cash

security-considerations
STEALTH ADDRESS

Security Considerations & Limitations

While stealth addresses enhance privacy, they introduce specific security trade-offs and operational constraints that users and developers must understand.

01

View Key Custody & Single Point of Failure

The view key is a critical security component that allows a recipient to scan for incoming payments. Its compromise reveals all past and future transactions associated with the stealth address. Unlike a traditional private key, which secures funds, the view key's sole purpose is to break privacy, creating a unique attack vector. Custody models are complex, as the view key must be accessible to wallet software for scanning but kept secure from adversaries.

02

Metadata Leakage & Linkability

Stealth addresses protect on-chain linkability but do not conceal transaction metadata. Observers can still analyze:

  • Timing: When a stealth transaction is broadcast.
  • Amount: The value being transferred.
  • Network-Level Data: IP addresses during broadcast (unless using a mixer or VPN).
  • Ephemeral Key Reuse: If a sender accidentally reuses an ephemeral private key, it can link multiple stealth addresses back to the original sender's public key.
03

Scanning Overhead & User Experience

Recipients must constantly scan the blockchain to discover funds sent to their stealth addresses, which requires significant computational resources. This creates practical limitations:

  • Resource Intensity: Light clients or mobile wallets may struggle with the scanning load.
  • Delayed Discovery: Funds are not instantly visible; discovery depends on scan frequency.
  • Centralization Pressure: To avoid local scanning, users may rely on third-party indexer services, which could become privacy bottlenecks and points of failure.
04

Interoperability & Protocol Support

Stealth addresses are not natively supported by most blockchain protocols or smart contract platforms, leading to fragmentation and integration challenges.

  • Smart Contract Limitations: Most EVM-based contracts cannot send to or interact with stealth addresses directly.
  • Wallet & Exchange Support: Broad adoption requires integration by custodians, exchanges, and wallet providers, which has been slow.
  • Fragmented Standards: Multiple implementations (e.g., Monero, Zcash Sapling, ERC-5564) exist, creating compatibility issues across ecosystems.
05

Quantum Vulnerability of Underlying Cryptography

Most stealth address schemes rely on standard elliptic curve cryptography (e.g., secp256k1). A sufficiently powerful quantum computer running Shor's algorithm could break the underlying Discrete Logarithm Problem (DLP), compromising both funds and privacy. While this is a long-term threat shared by most cryptocurrencies, it is particularly acute for stealth addresses because compromising the spend key reveals funds and compromising the view key reveals all historical transaction graphs.

06

Regulatory & Compliance Friction

The enhanced privacy provided by stealth addresses conflicts with regulatory frameworks like Travel Rule (FATF Recommendation 16) and Anti-Money Laundering (AML) directives, which require VASPs to identify transaction origins and destinations. This creates significant adoption barriers:

  • Exchange Delistings: Assets with strong privacy features face delisting from regulated exchanges.
  • Proof-of-Funds Challenges: Users may find it difficult to provide auditable proof of funds for loans or compliance without revealing their view key.
  • Design Tensions: Future implementations may need to incorporate regulatory-compliant privacy, which is a complex cryptographic and design challenge.
FAQ

Common Misconceptions About Stealth Addresses

Stealth addresses are a powerful privacy-enhancing technology, but their mechanics are often misunderstood. This section clarifies frequent points of confusion regarding their security, anonymity, and practical use.

No, stealth addresses provide transactional privacy, not complete anonymity. A stealth address hides the link between a recipient's published public address and the one-time address used in a specific transaction on-chain. However, metadata leaks from the surrounding transaction, network layer analysis, or user behavior can still compromise privacy. The technology is a powerful tool within a broader privacy stack that should include other techniques like coin mixing or using privacy-focused networks.

PRIVACY

Technical Deep Dive: The Cryptography

Stealth addresses are a cryptographic privacy mechanism that allows a recipient to generate a unique, one-time public address for each transaction, breaking the linkability of their blockchain activity.

A stealth address is a privacy-enhancing cryptographic technique that generates a unique, one-time destination address for each transaction sent to a recipient, preventing observers from linking multiple payments to the same entity on a public blockchain. The recipient publishes a single, long-term stealth meta-address, from which senders can cryptographically derive a unique, ephemeral public key (the stealth address) for each payment. Only the intended recipient, using their private view key and spend key, can detect and spend funds sent to these derived addresses. This mechanism decouples transaction outputs from the recipient's public identity, providing strong transaction graph unlinkability.

STEALTH ADDRESSES

Frequently Asked Questions (FAQ)

Stealth addresses are a privacy-enhancing technology that allows users to receive cryptocurrency without revealing their public address on-chain. This section answers common technical and practical questions about their operation and implementation.

A stealth address is a one-time, unique receiving address generated for each transaction to protect the recipient's privacy. It works using a cryptographic protocol where the sender generates a shared secret with the recipient's spending public key. The sender then uses this secret to derive a one-time public key (the stealth address) for the transaction and publishes a cryptographic clue on-chain. Only the recipient, using their private key, can scan the blockchain for these clues, compute the corresponding one-time private key, and spend the funds, thereby breaking the link between their main identity and the transaction on the public ledger.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Stealth Address: Definition & How It Works | Blockchain Privacy | ChainScore Glossary