X Shen, W Wang, Y Wang, B Wang, H Zhu - Available at SSRN 4997771 - papers.ssrn.com
In the context of Web 3.0, user data must be encrypted and can only be decrypted and
accessed by authorized nodes. Unfortunately, encryption disrupts the structure of data …