Special thanks to Pascal Merkleplant for review and feedback.

Screenshot 2024-01-26 at 15.51.30.png

Table of contents**:**

Preface

Single wallet

Non deterministically derived wallets

Hierarchical Deterministically (HD) derived wallets

View only (Neutered) derivation of HD wallets

Elliptic Curve Diffie-Hellman (ECDH)

Single key Stealth Addresses

Double key Stealth Addresses

EIP 5564: Stealth Addresses

Security Considerations

Pros and cons of each approach

Preface

On blockchains with a transparent transaction history, users often seek methods to make their transaction history private or unlinkable. Over time, stealth addresses have been increasingly used in various forms to achieve this.

Generally onchain privacy can be thought of as transactions that satisfy 1 or more of these properties:

  1. Unlinkability: Third parties cannot link a transaction between 2 address to the receiver’s or/and sender’s identity.