Research Article

A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique

Table 3

The comparison of safety and performance.

Type of solutionUser-level access controlGranularityData privacyKey security distributionEncryption/decryption key management

Scheme [7]Symmetric encryptionXX
Scheme [8]Hash synchronizationXX
Proposed schemeAttribute-based encryption