MoneroResearch.info

WIKINDX Resources

Mikic, M., Srbakoski, M., & Praska, S. 2025. Post-Quantum Stealth Address Protocols. 
Added by: Rucknium (27/02/2025, 16:20)   Last edited by: Rucknium (27/02/2025, 16:20)
Resource type: Miscellaneous
BibTeX citation key: Mikic2025
View all bibliographic details
Categories: Monero-focused
Creators: Mikic, Praska, Srbakoski
Views: 87/113
Attachments   2501.13733v1.pdf [12/21] URLs   https://arxiv.org/abs/2501.13733
Abstract
The Stealth Address Protocol (SAP) allows users to receive assets through stealth addresses that are unlinkable to their stealth meta-addresses. The most widely used SAP, Dual-Key SAP (DKSAP), and the most performant SAP, Elliptic Curve Pairing Dual-Key SAP (ECPDKSAP), are based on elliptic curve cryptography, which is vulnerable to quantum attacks. These protocols depend on the elliptic curve discrete logarithm problem, which could be efficiently solved on a sufficiently powerful quantum computer using the Shor algorithm. In this paper three novel post-quantum SAPs based on lattice-based cryptography are presented: LWE SAP, Ring-LWE SAP and Module-LWE SAP. These protocols leverage Learning With Errors (LWE) problem to ensure quantum-resistant privacy. Among them, Module-LWE SAP, which is based on the Kyber key encapsulation mechanism, achieves the best performance and outperforms ECPDKSAP by approximately 66.8% in the scan time of the ephemeral public key registry.
  
WIKINDX 6.10.2 | Total resources: 248 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced