{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:23:12Z","timestamp":1773886992427,"version":"3.50.1"},"reference-count":100,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3370857","type":"journal-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T20:10:11Z","timestamp":1708978211000},"page":"32089-32110","source":"Crossref","is-referenced-by-count":9,"title":["Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8456-1486","authenticated-orcid":false,"given":"Archana","family":"Chhabra","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-9512","authenticated-orcid":false,"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0026-149X","authenticated-orcid":false,"given":"Gulshan","family":"Kumar","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, India"}]},{"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Chonnam National University, Yeosu Campus, Yeosu, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819816-2.00014-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref3","first-page":"1","article-title":"IoT and blockchain convergence: Benefits and challenges","volume":"9","author":"Ahmed","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2017.33"},{"key":"ref5","article-title":"Strongly connected topology model and confirmation-based propagation method for cross-chain interaction","author":"Hong","year":"2015","journal-title":"arXiv:2102.09237"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ECIE52353.2021.00063"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169477"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA52658.2021.00083"},{"key":"ref9","volume-title":"Ripple-Backed Cross-Chain DeFi Platform Kava Integrates Band Protocol for Decentralized Oracle Support","author":"Srinawakoon","year":"2021"},{"key":"ref10","volume-title":"Polkadot: Vision for a Heterogeneous Multi-Chain Framework","author":"Wood","year":"2021"},{"key":"ref11","volume-title":"The Blocknet Design Specification","author":"Culwick","year":"2021"},{"key":"ref12","volume-title":"Aion: The Open Application Network","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3934\/mfc.2018007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.60082\/2817-5069.1134"},{"key":"ref17","first-page":"1","article-title":"A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management","author":"Pfitzmann","year":"2010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819816-2.00004-6"},{"key":"ref19","volume-title":"Data Privacy Issues in Blockchain","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2012.01.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1596\/978-0-8213-6513-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azh019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00191"},{"key":"ref26","first-page":"34","article-title":"Evaluating user privacy in Bitcoin, financial cryptography and data security","volume-title":"Proc. 17th Int. Conf.","author":"Androulaki"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.292"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-4861-5.ch009"},{"key":"ref31","first-page":"1","volume-title":"Ethereum: A Secure Decentralized Generalized Transaction Ledger","volume":"151","author":"Wood","year":"2014"},{"key":"ref32","first-page":"1","article-title":"Blockchain for health data and its potential use in health it and healthcare-related research","volume-title":"Proc. ONC\/INST","author":"Linn"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0050"},{"key":"ref34","first-page":"490","article-title":"E-commerce blockchain consensus mechanism for supporting high-throughput and real-time transactions, Networking, Applications, and Worksharing","volume-title":"Proc. 12th Int. Conf. Comput. Netw., Appl., Worksharing","author":"Xu"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394569"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877634"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2019.8666470"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0574-6"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292361"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.08.011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3186945"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3177211"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3577926"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSSM.2016.7538424"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2507\/28th.daaam.proceedings.146"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IOT-TUSCANY.2018.8373021"},{"key":"ref48","first-page":"103","article-title":"TPPSUPPLY: A traceable and privacy-preserving blockchain system architecture for the supply chain","volume":"66","author":"Bura","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/su15086905"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.005"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2847632"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896065"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94370-1_11"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00038"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102355"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3147925"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908265"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0995-5"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.11.046"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948053"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3002096"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00057"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.026"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/s19020326"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CSP51677.2021.9357604"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain55522.2022.00030"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.121"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1689"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/mbits.2023.3322972"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365998"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006861"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2977058"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.02.003"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282975"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174334"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2019.00012"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644088"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016945"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4911"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973291"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0025"},{"key":"ref85","volume-title":"Enigma: Decentralized Computation Platform with Guaranteed Privacy","author":"Zyskind","year":"2015"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3019923"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100026"},{"key":"ref89","volume-title":"The Corda Platform: An Introduction","author":"Brown","year":"2018"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994294"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSE.2019.8823094"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS56295.2022.9914008"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950872"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3316481"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102892"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.tre.2022.102653"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1488-1_2"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2022.2135611"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111166"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10445462.pdf?arnumber=10445462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T02:11:05Z","timestamp":1709863865000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10445462\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":100,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3370857","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}