Research Article
A Crowdsourcing Information Obtaining Scheme Aiming at Senior Netizens Based on Blockchain
Table 1
Comparison of privacy protection property.
| | [4] | [5] | [6] | [7] | [8] | [9] | [10] | [11] | [12] | [13] | [14] | Ours |
| Privacy protection of outsourcer | Weak anonymity | Strong anonymity | × | × | × | Weak anonymity | Weak anonymity | Weak anonymity | Weak anonymity | × | × | Strong anonymity | Privacy protection of contractor | Weak anonymity | Weak anonymity | × | × | × | Weak anonymity | Weak anonymity | Weak anonymity | × | × | × | Strong anonymity | Privacy protection of transaction data | No protection of transaction amount | × | × | × | × | √ | √ | √ | √ | √ | √ | √ |
|
|