Skip to main content

Advances, Systems and Applications

Table 5 Storage comparison for key

From: The key security management scheme of cloud storage based on blockchain and digital twins

Schemes

Li et al.

Wang et al.

Kwon et al.

This sheme

User

16

161

16

CSP

16

\(n\times 16\)

KS

\(n\times 16\)

16

IS

16

BC

\(n\times 16\)