Research Article

User Sensitive Information Protection Scheme Based on Blockchain Technology

Figure 1

The average computation delay and communication cost of constructing an anonymous region.
(a) Average computing delay of requesting user and cooperating user
(b) Average communication cost requesting user and cooperating user