Technical Workflow
Technical Workflow
Stealth addresses on KION operate through a structured process that ensures privacy, security, and usability on Solana. The workflow consists of three main steps:
Generation – Creating stealth addresses for private transactions.
Parsing – Detecting and processing incoming stealth transactions.
Private Key Derivation – Enabling secure access to received funds.
While inspired by EIP-5564, this implementation is specifically optimized for Solana’s runtime and architecture, ensuring efficient transaction execution and seamless integration with Solana-based applications.
1. Generation
The sender generates a one-time stealth address for the recipient, ensuring that transactions remain unlinkable. This involves:
Utilizing the recipient’s stealth meta-address to derive a unique, disposable address.
Implementing elliptic curve cryptography (ECC) for secure key generation.
Publishing encrypted metadata to allow only the recipient to recognize and access the funds.
2. Parsing
The recipient must detect incoming stealth transactions using their Viewing Key. This process includes:
Scanning transaction metadata to identify relevant stealth addresses.
Efficiently filtering blockchain data without compromising performance.
Verifying transaction authenticity and ensuring only the recipient can recognize the funds.
3. Private Key Derivation
Once a stealth transaction is detected, the recipient needs to derive the private key for the corresponding stealth address to access and spend the funds. This step involves:
Using cryptographic techniques to securely compute the private key.
Preventing unauthorized access by ensuring only the intended recipient can reconstruct the key.
Managing key storage securely for seamless, long-term usability.
Learn more about Private Key Derivation →
By following this workflow, KION provides a robust, decentralized privacy layer on Solana, allowing users to transact without exposing their financial history.
Last updated
