{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:17:54Z","timestamp":1759133874835,"version":"3.37.3"},"reference-count":54,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Science and Technology Planning Project of Henan Province","award":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"],"award-info":[{"award-number":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"]}]},{"DOI":"10.13039\/501100013066","name":"Key Scientific Research Project of Colleges and Universities in Henan Province","doi-asserted-by":"publisher","award":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"],"award-info":[{"award-number":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"]}],"id":[{"id":"10.13039\/501100013066","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013082","name":"Open Project Foundation of Information Technology Research Base of Civil Aviation Administration of China","doi-asserted-by":"publisher","award":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"],"award-info":[{"award-number":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"]}],"id":[{"id":"10.13039\/501100013082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"],"award-info":[{"award-number":["192102210283","20A520040","CAAC-ITRB-201707","U1904119"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,15]]},"abstract":"<jats:p>Aiming at the privacy protection of lightweight nodes based on Bloom filters in blockchain, this paper proposes a new privacy protection method. Considering the superimposition effect of query information, node and Bloom filter are regarded as the two parties of the game. A privacy protection mechanism based on the mixed strategy Nash equilibrium is proposed to judge the information query. On this basis, a Bloom filter privacy protection algorithm is proposed when the probability of information query and privacy, not being leaked, is less than the node privacy protection. It is based on variable factor disturbance, adjusting the number of bits\u2019 set to 1 in the Bloom filter to improve the privacy protection performance in different scenarios. The experiment uses Bitcoin transaction data from 2009 to 2019 as the test data to verify the effectiveness, reliability, and superiority of the method.<\/jats:p>","DOI":"10.1155\/2021\/2067137","type":"journal-article","created":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T21:20:05Z","timestamp":1626470405000},"page":"1-17","source":"Crossref","is-referenced-by-count":6,"title":["A Privacy Protection Method of Lightweight Nodes in Blockchain"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0802-3384","authenticated-orcid":true,"given":"Lin","family":"Ge","sequence":"first","affiliation":[{"name":"School of Intelligent Engineering, Zhengzhou University of Aeronautics, Zhengzhou Henan 450046, China"},{"name":"Information Technology Research Base of Civil Aviation Administration of China, Civil Aviation University of China, Tianjin 300300, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3793-4603","authenticated-orcid":true,"given":"Tao","family":"Jiang","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou Henan 45002, China"},{"name":"National Engineering Laboratory for Mobile Network Security, Beijing 100876, China"}]}],"member":"311","reference":[{"key":"1","article-title":"Preface","volume-title":"Blockchain: Blueprint for a New Economy","author":"S. Melanie","year":"2015"},{"article-title":"Top trends in the Gartner hype cycle for emerging technologies","year":"2017","author":"K. Panetta","key":"2"},{"first-page":"557","article-title":"An overview of blockchain technology: architecture, consensus, and future trends","author":"Z. Zheng","key":"3"},{"key":"4","first-page":"6","article-title":"Blockchain technology: beyond bitcoin","volume":"2","author":"M. Crosby","year":"2016","journal-title":"Applied Innovation"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2017.3571047"},{"first-page":"131","article-title":"Rep on the block: a next generation reputation system based on the blockchain","author":"R. Dennis","key":"6"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2920987"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.01.006"},{"first-page":"1","article-title":"A blockchain-based framework for detecting malicious mobile applications in app stores","author":"S. Homayoun","key":"9"},{"first-page":"463","article-title":"Blockchain: future of financial and cyber security","author":"S. Singh","key":"10"},{"first-page":"1649","article-title":"Jupiter: a blockchain platform for mobile devices","author":"S. Han","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6874158"},{"article-title":"Bitcoin: a peer-to-peer electronic cash system","year":"2008","author":"S. Nakamoto","key":"13"},{"article-title":"Connection bloom filtering","year":"2012","author":"M. Hearn","key":"14"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0494-4"},{"key":"16","volume-title":"Mastering Bitcoin: Programming the Open Blockchain","author":"A. M. Antonopoulos","year":"2017","edition":"2nd"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1002\/9781119019138","volume-title":"Understanding Bitcoin: Cryptography, Engineering and Economics","author":"P. Franco","year":"2014"},{"first-page":"326","article-title":"On the privacy provisions of bloom filters in lightweight bitcoin clients","author":"A. Gervais","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.13868\/j.cnki.jcr.000290"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2950872"},{"issue":"10","key":"21","first-page":"2170","article-title":"Survey on privacy preserving techniques for blockchain technology","volume":"54","author":"L. Zhu","year":"2017","journal-title":"Journal of Computer Research and Development"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2842460"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2018.1700401"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2893433"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1700269"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8315614"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/358161.358167"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.07.024"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33627-0_27"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2020.2976113"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-020-9638-7"},{"first-page":"75","article-title":"Secure multiparty mixing of bitcoins","author":"J. H. Ziegeldorf","key":"32"},{"article-title":"The Bitcoin lightning network: scalable off-chain instant payments","year":"2019","author":"J. Poon","key":"33"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00459-6"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_8"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2827163"},{"issue":"2","key":"37","first-page":"131","article-title":"Cryptographically secure bloom-filters","volume":"2","author":"R. Nojima","year":"2009","journal-title":"Transactions on Data Privacy"},{"first-page":"1","article-title":"Design of privacy-preserving mobile bitcoin client based on \u03b3-deniability enabled bloom filter","author":"K. Kanemura","key":"38"},{"first-page":"60","article-title":"Applying private information retrieval to lightweight bitcoin clients","author":"K. Qin","key":"39"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2018.3111245"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.026"},{"first-page":"706","article-title":"Protecting access privacy for Bitcoin lightweight client using trusted hardware","author":"X. Li","key":"42"},{"first-page":"1","article-title":"An efficient query scheme for privacy-preserving lightweight bitcoin client with Intel SGX","author":"Y. Niu","key":"43"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0039"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-9922"},{"volume-title":"Theory of Games and Economic Behavior","year":"1944","author":"J. V. Neumann","key":"46"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"volume-title":"Game Theory","year":"2007","author":"Y. F. Luo","key":"48"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1001.2009.00096"},{"key":"51"},{"key":"52"},{"key":"53"},{"article-title":"Privacy assumptions","year":"2014","author":"J. Bitcoin","key":"54"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/2067137.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/2067137.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/2067137.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T21:20:21Z","timestamp":1626470421000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/2067137\/"}},"subtitle":[],"editor":[{"given":"Irshad","family":"Azeem","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,7,15]]},"references-count":54,"alternative-id":["2067137","2067137"],"URL":"https:\/\/doi.org\/10.1155\/2021\/2067137","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,7,15]]}}}