Table 8 Comparison of access control modes.

From: Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products

Characterisation

Jianbiao et al.34

Gechang et al.35

Wenjun et al.36

Wang et al.37

This study

Blockchain-based

 × 

fine-grained access control

 × 

privacy protection

Support for property update

 × 

 × 

Data tampering prevention

 × 

smart contract

 × 

 × 

 ×