ExePay Technical Whitepaper

Privacy-Preserving Payment Infrastructure for High-Performance Blockchains

Version 1.0โ€ขDecember 2025โ€ขView on GitHub โ†’

๐Ÿ“„ Abstract

We present ExePay, a comprehensive privacy-preserving payment infrastructure for Solana that combines zero-knowledge proof systems, cryptographic stealth protocols, and state compression to achieve enterprise-grade transaction privacy with sub-second finality. By adapting Monero's battle-tested stealth address protocol to Solana's account model and integrating Light Protocol's ZK compression, we achieve a 1000x cost reduction while maintaining strong privacy guarantees.

Table of Contents

1. Introduction

1.1 Motivation

Public blockchains provide unprecedented transparency and auditability, but this transparency creates significant privacy concerns for both individuals and enterprises. Every transaction on Solana is publicly visible, revealing wallet balances, transaction graphs, income patterns, and spending habits.

This transparency is incompatible with:

  • Business requirements - Protecting revenue from competitors
  • Individual privacy - Financial sovereignty and safety
  • Regulatory compliance - GDPR and data minimization principles
  • Real-world adoption - Mainstream users expect privacy

1.2 Design Goals

ExePay aims to achieve:

  1. Privacy - Hide transaction participants and amounts while maintaining auditability
  2. Performance - Sub-second transaction finality compatible with Solana's speed
  3. Cost - Transaction costs under $0.01 via zero-knowledge state compression
  4. Compatibility - Works with existing Solana wallets and infrastructure
  5. Flexibility - Configurable privacy levels for different use cases
  6. Compliance - Cryptographic payment proofs for auditing and dispute resolution

1.3 Key Contributions

  • Novel adaptation of UTXO-based privacy (Monero) to account-based blockchains (Solana)
  • Hybrid privacy architecture combining stealth addresses with ZK compression
  • Payment proof protocol enabling privacy with regulatory compliance
  • Performance optimizations (view tags, batch processing) for practical deployment
  • Production implementation with comprehensive SDK and mainnet deployment

2. Background and Related Work

2.1 Privacy in Cryptocurrencies

Zcash

Introduced zk-SNARKs for transaction privacy but requires trusted setup and has high computational overhead (30+ second proving time).

Monero

Uses ring signatures, stealth addresses, and RingCT. Battle-tested over 10 years with $3B market cap. Separate blockchain incompatible with Solana.

Tornado Cash

Provided Ethereum mixing via ZK proofs but faced regulatory challenges. Sanctioned by OFAC in 2022 due to lack of compliance features.

Light Protocol

Introduces ZK state compression for Solana (1000x cost reduction). Provides amount privacy but not recipient/sender privacy.

โœจ No existing solution combines stealth addresses, ZK compression, payment proofs, and production-ready implementation on Solana.

3. System Architecture

3.1 Overview

ExePay consists of three layers:

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                  Application Layer                       โ”‚
โ”‚  (Web App, Mobile, SDK, API)                            โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                  Privacy Layer                           โ”‚
โ”‚  โ€ข Stealth Addresses      โ€ข Payment Proofs              โ”‚
โ”‚  โ€ข ZK Compression         โ€ข Subaddresses                โ”‚
โ”‚  โ€ข Shielded Balances      โ€ข Scanning Engine             โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                Payment Infrastructure                    โ”‚
โ”‚  โ€ข Multi-token        โ€ข Batch Transfers                 โ”‚
โ”‚  โ€ข Recurring          โ€ข Payment Links                   โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚                  Solana Blockchain                       โ”‚
โ”‚  (Account Model, <400ms finality, $0.00025/tx)          โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

3.2 Privacy Modes

Users can select privacy level based on their requirements:

ModeRecipientSenderAmountCostUse Case
PublicVisibleVisibleVisible$0.00025Transparent transactions
ShieldedHiddenVisibleHidden$0.001Light Protocol ZK compression
StealthHiddenVisibleVisible$0.00025Recipient privacy (Monero-style)
Full (Roadmap)HiddenHiddenHidden$0.002Maximum privacy

4. Cryptographic Foundations

4.1 Elliptic Curve Diffie-Hellman (ECDH)

ExePay uses X25519 for ECDH key exchange, enabling two parties to establish a shared secret. Alice generates private key a and public key A = aG. Bob generates private key b and public key B = bG. The shared secret is S = aB = bA = abG.

Security: Relies on hardness of Computational Diffie-Hellman (CDH) problem. Requires O(2128) operations for Curve25519 (128-bit security).

4.2 Key Derivation Functions

We use Keccak-256 for key derivation. Keccak-256 provides 256-bit output with:

  • Collision resistance: O(2128) operations
  • Preimage resistance: O(2256) operations
  • Used in Ethereum, proven secure

4.3 Zero-Knowledge Proofs

We utilize Groth16 pairing-based zk-SNARKs for proving statements without revealing witnesses:

  • Completeness: Valid proofs always verify
  • Soundness: Invalid proofs rejected with overwhelming probability
  • Zero-knowledge: Proof reveals nothing about witness
  • Succinctness: Proof size O(1), verification time O(|public inputs|)

5. Privacy Components

5.1 Stealth Addresses

Protocol:

  1. Recipient Setup: Generate spend keypair (s, S) and view keypair (v, V). Publish meta-address M = (S, V)
  2. Sender Payment: Generate ephemeral keypair (r, R). Compute shared secret P = rV. Derive stealth address K and view tag t
  3. Recipient Scanning: For each transaction, check view tag. If match, compute stealth address and verify ownership
  4. Recipient Claiming: Derive stealth private key and transfer funds

Security: Recipient anonymity relies on DLP hardness and collision resistance of Keccak-256.

5.2 Payment Proofs

Cryptographic proofs enabling senders to prove payment without revealing recipient identity. Proof includes transaction signature, ephemeral public key, amount, and recipient meta-address hash.

Use Cases: Tax audits, dispute resolution, compliance, business expense verification

5.3 Integrated Addresses

Extend stealth addresses to embed 8-byte payment ID for invoice/order tracking. Payment ID included in transaction memo, auto-matched by recipient during scanning.

5.4 Subaddresses

Hierarchical stealth identities: Si = H(s || i) ยท G + S, Vi = H(v || i) ยท G + V. Each subaddress is cryptographically unlinkable (DLP hardness). Perfect for separating business/personal funds.

5.5 View Tags

1-byte hint attached to each payment. Recipient checks hint first (cheap), filtering 99% of transactions instantly. Only 1% require expensive ECDH computation. 100x performance improvement.

6. Payment Infrastructure

  • Multi-Token: SOL, SPL tokens with automatic routing
  • Batch Transfers: Combine multiple transfers (up to 30 per transaction)
  • Recurring Payments: Authorized schedules with user control
  • Payment Links: QR code generation, expiration, single-use links

7. Security Analysis

Threat Model

Adversary Capabilities:

  • Monitors all on-chain transactions
  • Controls multiple RPC nodes
  • May compromise view key (but not spend key)
  • Cannot break cryptographic primitives (128-bit security)

Assets Protected: Recipient identity, transaction linkability, payment amounts (in compressed mode)

Assets Not Protected: Sender identity (visible on-chain), transaction existence, metadata

Attack Mitigation

  • Transaction Graph Analysis: Stealth addresses break transaction graph links
  • Timing Analysis: Users can delay transactions, use varying intervals
  • Amount Analysis: Shielded balances hide amounts
  • Denial of Service: View tags filter 99% of spam

8. Performance Evaluation

Benchmarks (M1 MacBook Pro, 16GB RAM)

OperationTimeTPS
Generate Stealth Address2.1 ms476
Scan 100 Tx (with view tags)18 ms5,555
Scan 100 Tx (without view tags)1,830 ms54
Generate Payment Proof3.4 ms294
ZK Proof Generation420 ms2.4
ZK Proof Verification8 ms125

โœ… View tags provide 101x speedup for scanning (18ms vs 1830ms)

Cost Analysis

  • Standard Transfer: $0.00025
  • Stealth Address Payment: $0.00025
  • Compressed Transfer: $0.00000025 (1000x cheaper)
  • Batch Transfer (10 recipients): $0.000025 per recipient

9. Future Work

  • Sender Anonymity: Ring signatures for sender privacy (Monero's RingCT adapted to Solana)
  • Advanced ZK Circuits: Single proof for entire transaction (sender + receiver + amount)
  • Cross-Chain Privacy: ZK bridge protocol for Ethereum, Polygon
  • Hardware Wallets: Ledger/Trezor integration for secure key management
  • Mobile SDK: Native iOS/Android with GPU-accelerated ZK proving

10. Conclusion

ExePay demonstrates that strong privacy and high performance are not mutually exclusive. By adapting proven cryptographic protocols to high-performance blockchains and integrating cutting-edge ZK technology, we achieve:

๐Ÿ” Cryptographic Privacy

Recipient anonymity + amount hiding (ZK compression)

โšก Sub-second Finality

Solana's 400ms blocks maintained

๐Ÿ’ฐ $0.00025 Cost

1000x cheaper than Ethereum

๐Ÿš€ Production Ready

Mainnet deployed, audited libraries

Privacy is not a feature. It's a fundamental right.

๐Ÿ“– Complete Whitepaper

This page provides an overview. For the complete technical whitepaper including mathematical proofs, code examples, and full references, visit: