Advances, Systems and Applications
Scheme | Privacy1 | User security2 | Data callability3 | Access control 4 |
---|---|---|---|---|
Luo et al. [34] | \(\checkmark\) | \(\checkmark\) | \(\times\) | - |
Li et al. [37] | \(\checkmark\) | \(\times\) | \(\checkmark\) | - |
Li et al. [38] | \(\checkmark\) | \(\times\) | \(\checkmark\) | - |
Zhang et al. [39] | \(\checkmark\) | \(\times\) | \(\times\) | \(\checkmark\) |
Ours | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |