“…Lightweight BC for resource-constrained devices 45,51,57 Consensus protocols 45,66,71 Scalability and processing overheads 51,59,63 Latency and throughput 46,72,73 Energy efficiency 45,74,75 Identity 74, [76][77][78] Auditability and accountability 33,75,79 BC-based authentication schemes 35 data without learning anything from them. Their system consists of record nodes and light nodes.…”