Skip to main content

The Problem We Solve

Every blockchain transaction is public. When someone sends you money, anyone can trace that payment back to your identity, see your balance, and track your activity. SPECTER makes payments private. It gives every recipient a way to receive funds at unique, one-time addresses that cannot be linked back to their main wallet — even by someone watching every transaction on the chain. And it does this with post-quantum cryptography (ML-KEM-768), meaning your privacy stays safe even when quantum computers arrive.

The Analogy — Think “Secure Mail Concierge”

Imagine you live in an apartment building:

You share your building address

You give out your building’s public address — anyone can send you packages. This is your meta-address (public profile).

Every package goes to a fresh locker

Instead of delivering to your door, each package gets its own brand-new private locker. This is the stealth address — unique for every payment.

A delivery notice is posted

The concierge posts a coded notice on the board. This is the announcement — it’s public, but only you can decode which locker is yours.

Only you can find your lockers

You have a special viewing key that lets you scan all the notices and figure out which lockers belong to you. No one else can.
Replace “packages” with crypto payments and “lockers” with blockchain addresses — that’s SPECTER in a nutshell.

How It Works — The 4-Step Flow

StepWhat happensWho does it
1. ProfileRecipient generates a public meta-address (spending key + viewing key)Recipient
2. CreateSender uses the meta-address to derive a fresh one-time stealth addressSender
3. PublishSender publishes an announcement so recipient can find their paymentSender
4. ScanRecipient scans announcements with their private viewing keyRecipient

What We Built — Three Layers

Intro Layer

The idea: Private one-time receiving addresses that break the link between sender and recipient.

Product Layer

The app: A full frontend for key generation, stealth payment creation, publishing, and scanning — try it live.

Tech Layer

The crypto: ML-KEM-768 (post-quantum) + view tags for fast filtering + announcement registry.
Setup — one-time key generation Send — create a stealth payment Scan — discover your payments

Under the Hood — For the Curious

ML-KEM-768 is a NIST-standardized post-quantum key encapsulation mechanism (FIPS 203). It lets two parties establish a shared secret even if an attacker has a quantum computer. SPECTER uses the ml-kem crate for all encapsulation and decapsulation operations.
  • Public key size: 1184 bytes
  • Ciphertext size: 1088 bytes
  • Shared secret: 32 bytes
This replaces the traditional elliptic curve Diffie-Hellman used in classical stealth address protocols.
A view tag is a 1-byte fingerprint computed from the shared secret. When the recipient scans announcements, they first check the view tag — if it doesn’t match, they skip the expensive decapsulation step. This makes scanning ~256× faster on average.
When a sender creates a stealth payment, they publish an announcement containing the ephemeral ciphertext and view tag. The recipient periodically scans these announcements using their viewing secret key. The registry can be in-memory (for testing) or file-based (for persistence).
Currently, SPECTER supports Ethereum and Sui chains. It uses ENS for Ethereum name resolution and SuiNS for Sui name resolution. The core cryptography is chain-agnostic — only the name resolution and on-chain settlement differ.

Technical Flow — How the Crypto Maps


What’s Next?

You don’t need to understand the cryptography to use SPECTER. Start with the product tour, then integrate — the crypto details are always here when you’re ready.