Research Article

User Sensitive Information Protection Scheme Based on Blockchain Technology

Figure 2

Average computing delay required by the requesting user and collaboration user in the blockchain update.
(a) Average computing delay of requesting user
(b) Average computing delay of cooperative user