Research Article

IOV Privacy Protection System Based on Double-Layered Chains

Table 2

Efficiency comparison of single-layer chain and double-layer chain.

ā€‰single-layer chaindouble-layer chain

Communication complexity (secondary exchange of information)16

Communication throughput (bit/s)

Number of signatures (thousand)60006000/k

Trading volume per second1000

Data storage1000