Research Article
A Privacy Protection Method of Lightweight Nodes in Blockchain
Table 4
Ph (.) values using expansion, addition, and perturbation, respectively.
| Number of inserted addresses | Privacy degree | Expansion | Addition | α = 0.51 | α = 0.6 | α = 1 |
| N = 50 | Ph(1) | 0.0017 | 0.0017 | 0.0018 | 0.0018 | 0.0017 | Ph (25) | 0 | 0 | 0 | 0 | 0 | Ph (50) | 0 | 0 | 0 | 0 | 0 |
| N = 100 | Ph (1) | 0.2673 | 0.6371 | 0.0018 | 0.0048 | 0.2676 | Ph (25) | 0 | 0 | 0 | 0 | 0 | Ph (50) | 0 | 0 | 0 | 0 | 0 |
| N = 150 | Ph (1) | 0.9238 | 0.9994 | 0.0018 | 0.007 | 0.9239 | Ph (25) | 0.0697 | 0.9809 | 0 | 0 | 0.0699 | Ph (50) | 0 | 0.8814 | 0 | 0 | 0 |
| N = 200 | Ph (1) | 0.9938 | 1 | 0.0018 | 0.0085 | 0.9938 | Ph (25) | 0.8094 | 1 | 0 | 0 | 0.8096 | Ph (50) | 0.2645 | 0.9999 | 0 | 0 | 0.2648 |
| N = 250 | Ph (1) | 0.9992 | 1 | 0.0018 | 0.0096 | 0.9992 | Ph (25) | 0.9734 | 1 | 0 | 0 | 0.9735 | Ph (50) | 0.8385 | 1 | 0 | 0 | 0.8386 |
|
|