Table 1 Functional comparison.
From: Quantum key-based medical privacy protection and sharing scheme on blockchain
Schemes | Cryptographic | Noncryptographic | Cryptographic algorithm | Blockchain | Quantum key |
---|---|---|---|---|---|
Reference23 | \(\checkmark\) | − | Homomorphic encryption | \(\checkmark\) | \(\times\) |
Reference24 | \(\checkmark\) | − | Homomorphic encryption | \(\times\) | \(\times\) |
Reference25 | − | \(\checkmark\) | Genetic algorithm | \(\times\) | \(\times\) |
Reference26 | \(\checkmark\) | − | EdDSA | \(\times\) | \(\times\) |
Reference28 | \(\checkmark\) | − | ECC | \(\checkmark\) | \(\times\) |
Reference29 | \(\checkmark\) | − | RSA | \(\checkmark\) | \(\times\) |
Reference31 | \(\checkmark\) | − | ECC | \(\checkmark\) | \(\times\) |
Reference32 | \(\checkmark\) | − | Proxy re-encryption | \(\checkmark\) | \(\times\) |
Our | \(\checkmark\) | − | DES | \(\checkmark\) | \(\checkmark\) |