“…Information security blockchains are generally secure owing to asymmetric cryptography. However, as more attacks are developed, researchers have become interested in the ability of blocks to withstand attacks [43,44,46,52,55,56,61,71,72,77], such as inference attacks, poisoning attacks, DoS Hulk attacks, DDoS attacks, Portscan attacks, replay attacks, Sybil attacks, man-in-the-middle attacks, identity theft attacks, traffic analysis attacks, masquerading attacks, session key disclosure attacks, public ledger attacks, denial of service attacks, strongand weak-collisions attacks, compromised server attacks, insider attacks, stolen smartcard attacks, offline password guessing attacks, impersonation attacks, message modification attacks, fake/bogus message attacks, reply attacks, Eclipse attacks, collusion attacks, quantum computing attacks, and stolen authenticator attacks; 2. Anonymity refers to the exchange of addresses and information realized by users in a blockchain system to interact without revealing their true identities.…”