Research Article
A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique
Table 3
The comparison of safety and performance.
| Type of solution | User-level access control | Granularity | Data privacy | Key security distribution | Encryption/decryption key management |
| Scheme [7] | Symmetric encryption | ✓ | ✓ | X | X | Scheme [8] | Hash synchronization | X | X | — | — | Proposed scheme | Attribute-based encryption | ✓ | ✓ | ✓ | ✓ |
|
|