Table 7 Comparison of encryption modes.

From: Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products

Encryption method

Ciphertext access control

Resistance to conspiracy attacks

Re-encrypt

Traceable

Xuan et al.

 × 

 × 

Youliang et al.

 × 

 × 

Feng et al.

 × 

Khan et al.

 × 

 × 

This study