Skip to main content

Advances, Systems and Applications

Table 4 Computation comparison in different stages

From: The key security management scheme of cloud storage based on blockchain and digital twins

Schemes

Li et al.

Wang et al.

Kwon et al.

This scheme

Stage I

Sha

tSha

2Sha + 2RF + RD + MG

Sha

Stage II

Sha + RE + RD

2Sha + 2PO + XG

Sha + 2PE + 3MG + XG

3RE + 2RD

Stage III

RE + RD

2Sha + 2PO + XG

Sha + PO + 3MG + XG

3Sha + RE + 2RD