Research Article

Covert Communication Scheme Based on Bitcoin Transaction Mechanism

Algorithm 1

Iterative hashing.
Input: Security parameter λ.
Output: Key k.
(1);
(2)After using k;
(3);
(4)After using k;
(5);
(6)......;
(7)End;