Ent encryption solutions and keys [29,30]. IL-4 Protein manufacturer Asymmetric or symmetric approach, DHT access, blockchain access, and ring signature. WeEnergies 2021, 14,15 ofcalculated the time consumption while performing a data create with no pre-existing information, create with pre-existing data, and read operations. We calculated the time cost for asymmetric encryption as shown in Figures five and 6, respectively. We present a comparative evaluation involving asymmetric encryption without having ring signature and asymmetric encryption applying ring signature as demonstrated in Figures five and six. overall data create time (with no pre-existing data) for asymmetric encryption without the need of ring signature is greater than the overall time of asymmetric encryption using ring signature. The total time consumption to create data (with pre-existing data) for asymmetric encryption without the need of a ring signature is greater than the general asymmetric Energies 2021, 14, x FOR PEER Review 16 of 23 encryption time using ring signature. Total time for you to study data will not be substantially affected for each Energies 2021, 14, x FOR PEER Review 16 of 23 Figures five and six.Figure 5. Asymmetric encryption time without ring signature. Figure 5. Asymmetric encryption time without the need of ring signature. Figure 5. Asymmetric encryption time with out ring signature.Figure six. Asymmetric encryption time using ring signature. Figure six. Asymmetric encryption time working with ring signature.Figure six. Asymmetric encryption time working with ring signature.Energies 2021, 14,16 ofFigures 7 and eight present the time cost for symmetric encryption with no ring signature and symmetric encryption employing ring signature. Blockchain access time for symmetric encryption devoid of a ring signature is significantly less as when compared with the general time of symmetric encryption working with ring signature in case of data write (with no pre-existing information). The total time consumption to create information (with pre-existing data) of symmetric encryption making use of ring signature is greater in comparison to the total time of symmetric encryption without having ring signature. For data study, the overall time consu.