A Privacy Protection Method of Lightweight Nodes in Blockchain
نویسندگان
چکیده
Aiming at the privacy protection of lightweight nodes based on Bloom filters in blockchain, this paper proposes a new method. Considering superimposition effect query information, node and filter are regarded as two parties game. A mechanism mixed strategy Nash equilibrium is proposed to judge information query. On basis, algorithm when probability privacy, not being leaked, less than protection. It variable factor disturbance, adjusting number bits’ set 1 improve performance different scenarios. The experiment uses Bitcoin transaction data from 2009 2019 test verify effectiveness, reliability, superiority
منابع مشابه
LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which are not suited to the IoT context. We propose a ...
متن کاملLightweight Delegated Subset Test with Privacy Protection
Delegated subset tests are mandatory in many applications, such as content-based networks and outsourced text retrieval, where an untrusted server evaluates the degree of matching between two data sets. We design a novel scheme to protect the privacy of the data sets in comparison against the untrusted server, with half of the computation cost and half of the ciphertext size of existing solutio...
متن کاملEfficient Public Blockchain Client for Lightweight Users
Public blockchains provide a decentralized method for storing transaction data and have many applications in different sectors. In order for users to track transactions, a simple method is to let them keep a local copy of the entire public ledger. Since the size of the ledger keeps growing, this method becomes increasingly less practical, especially for lightweight users such as IoT devices and...
متن کاملBlockchain Enabled Privacy Audit Logs
Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper...
متن کاملPoster: Towards Blockchain Transaction Privacy
Blockchains allow users to transfer money securely to possibly unknown and untrusted counterparties, without requiring a trusted intermediary. Transactions contain the value being transferred, and sender and recipient identifiers (known as addresses) in the clear, meaning that although onchain addresses are unlinked from off-chain identities, monetary movements are easily traceable. We explore ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/2067137