Research Article

Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing

Table 1

Feature comparison of blockchain data query schemes.

ā€‰Type of blockchainApplication scenariosData query technology adoptedAdvantagesDisadvantages

Literature [19]Consortium blockchain, public blockchainDigital archive managementSmart contractQueries are automatically executed when user requests meet preset rules and do not rely on nonblockchain systems.Each node needs to run the deployed contract, and the resource consumption of blockchain applications is large.
Literature [20]Consortium blockchainMedical data sharingSmart contract
Literature [21]Consortium blockchainMedical privacy data sharingSmart contract
Literature [22]Public blockchainPaid query of dataSmart contract

Literature [23]Public blockchainData security sharingAttribute-based encryptionEasy to add an access permission control mechanism, which makes access permission control more fine-grained.Inability to quickly respond to situations where the actual inquirers do not match the preset inquirers.
Literature [24]Private blockchain, consortium blockchainEnterprise data sharingAttribute-based encryption
Literature [25]Private blockchainMedical data sharingProxy reencryption
Literature [26]Consortium blockchainIoT device data queryPrefix encryption

Literature [27]Consortium blockchainMedical privacy data sharingSecret sharingDetermine the general query permission scope in advance, which is suitable for shared query scenarios. Data can be queried only when the number of users applying for reconstruction exceeds the preset threshold.There is no data reconstruction mechanism. Unable to recover data when there is a failed node.
Literature [28]Not specifiedCyber-physical systemSecret sharingOnly one data query request can be served. When the number of inquiries is large, the system transmission volume is large.
Literature [29]Public blockchainCloud data sharingSecret sharing