skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition

New Post-Quantum Stealth Address Protocols Introduced

/ 1 min read

🔒✨ New post-quantum stealth address protocols enhance privacy in digital transactions. Researchers have introduced three novel Stealth Address Protocols (SAPs) that utilize lattice-based cryptography to provide quantum-resistant privacy for asset transactions. The existing Dual-Key SAP (DKSAP) and Elliptic Curve Pairing Dual-Key SAP (ECPDKSAP) are vulnerable to quantum attacks due to their reliance on elliptic curve cryptography. The new protocols—LWE SAP, Ring-LWE SAP, and Module-LWE SAP—leverage the Learning With Errors (LWE) problem to ensure security against quantum threats. Notably, the Module-LWE SAP, based on the Kyber key encapsulation mechanism, demonstrates a significant performance improvement, outperforming ECPDKSAP by approximately 66.8% in ephemeral public key registry scan time.

Source
{entry.data.source.title}
Original