{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:32:31Z","timestamp":1762867951156,"version":"3.37.3"},"reference-count":18,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T00:00:00Z","timestamp":1571184000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"],"award-info":[{"award-number":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"],"award-info":[{"award-number":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"],"award-info":[{"award-number":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology project of Fujian Province","award":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"],"award-info":[{"award-number":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"]}]},{"name":"Science and Technology project of Xiamen Municipal","award":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"],"award-info":[{"award-number":["11804114","2017J01761","2018J01537","2019H0021","3502Z20173028"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,10,16]]},"abstract":"<jats:p>Blockchain is an emerging technology that promises many exciting applications in various fields, including financial, medical, energy, and logistics management. However, there are still some limitations in the existing blockchain framework that prevents its widespread adoption in the commercial world. One important limitation is the storage requirement, wherein each blockchain node has to store a copy of the distributed ledger. Thus, as the number of transactions increases, this storage requirement grows quadratically, eventually limiting the scalability of a blockchain system. Moreover, the public ledger in a blockchain framework allows anyone in the network to audit the transaction, which may not be favourable in some privacy-sensitive applications. In this paper, a secret-sharing scheme is proposed to reduce the size of the blockchain transactions. Each transaction block is divided into <jats:italic>t<\/jats:italic> parts, and the size of each part is 1\/<jats:italic>t<\/jats:italic> size of transaction block. We use the secret-sharing mechanism to share <jats:italic>t<\/jats:italic> parts into <jats:italic>n<\/jats:italic> shares. Hence, each node stores not one transaction but one share in the blockchain system. The proposed scheme can eventually reduce the storage cost of a blockchain transaction by 1\/<jats:italic>t<\/jats:italic> without introducing an additional recovery communication cost; however, robustness is reduced in node failure as a tradeoff. Meanwhile, the proposed scheme was more efficient and secure compared to other state-of-the-art schemes that aim to reduce blockchain storage for industrial big data.<\/jats:p>","DOI":"10.1155\/2019\/9060756","type":"journal-article","created":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T19:31:00Z","timestamp":1571254260000},"page":"1-7","source":"Crossref","is-referenced-by-count":12,"title":["Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7272-0563","authenticated-orcid":true,"given":"Hefeng","family":"Chen","sequence":"first","affiliation":[{"name":"Computer Engineering College, Jimei University, Xiamen 361021, China"}]},{"given":"Hsiao-Ling","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, Taichung 413, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":true,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407, Taiwan"}]},{"given":"Long-Sheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Information Management, Chaoyang University of Technology, Taichung 413, Taiwan"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2018.2883629"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2814624"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2018.2886016"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.01.065"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.038"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2015.2432800"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4065-z"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5412-4"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.077"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1983.1056651"},{"issue":"12","key":"17","first-page":"2762","volume":"e83-a","year":"2000","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/s0096-3003(03)00355-2"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.11.031"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.013"},{"year":"2008","key":"21"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/9060756.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/9060756.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/9060756.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T19:31:05Z","timestamp":1571254265000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/9060756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,16]]},"references-count":18,"alternative-id":["9060756","9060756"],"URL":"https:\/\/doi.org\/10.1155\/2019\/9060756","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,10,16]]}}}