A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain

Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most of these traditional schemes need to store a large amount of identity authentication or public key information, which makes the schemes diffic...

Full description

Bibliographic Details
Main Authors: Sheng Gao, Qianqian Su, Rui Zhang, Jianming Zhu, Zhiyuan Sui, Junsheng Wang
Format: Article
Language:English
Published: Hindawi-Wiley 2021-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2021/9992353