Skip to main content

Advances, Systems and Applications

Table 3 Security comparison between our scheme and some references

From: Security scheduling and transaction mechanism of virtual power plants based on dual blockchains

Security Features

Ref. [24]

Ref. [25]

Ref. [26]

Our scheme

Authenticity

×

√

×

√

Confidentiality

×

×

√

√

Transparency

√

√

√

√

Traceability

√

√

√

√

Immutability

√

√

√

√

Non-repudiation

×

×

√

√