Table 1 Functional comparison.

From: Quantum key-based medical privacy protection and sharing scheme on blockchain

Schemes

Cryptographic

Noncryptographic

Cryptographic algorithm

Blockchain

Quantum key

Reference23

\(\checkmark\)

Homomorphic encryption

\(\checkmark\)

\(\times\)

Reference24

\(\checkmark\)

Homomorphic encryption

\(\times\)

\(\times\)

Reference25

\(\checkmark\)

Genetic algorithm

\(\times\)

\(\times\)

Reference26

\(\checkmark\)

EdDSA

\(\times\)

\(\times\)

Reference28

\(\checkmark\)

ECC

\(\checkmark\)

\(\times\)

Reference29

\(\checkmark\)

RSA

\(\checkmark\)

\(\times\)

Reference31

\(\checkmark\)

ECC

\(\checkmark\)

\(\times\)

Reference32

\(\checkmark\)

Proxy re-encryption

\(\checkmark\)

\(\times\)

Our

\(\checkmark\)

DES

\(\checkmark\)

\(\checkmark\)