Research Article
Post-Quantum Privacy-Preserving Provable Data Possession Scheme Based on Smart Contracts
Table 2
Comparison of the characteristics of schemes.
| | [15] | [17] | [19] | [28] | [30] | Our scheme |
| Post quantum | × | × | × | √ | √ | √ | Public verification | √ | √ | √ | √ | √ | √ | Privacy-preserving | × | × | √ | × | √ | √ | Noninteractive | √ | × | √ | × | × | √ | Fair payment | √ | × | √ | × | × | √ |
|
|