cognitive cybersecurity intelligence

News and Analysis

Search

SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier

The paper discusses the use of blockchain system such as Ethereum or Hyperledger for user authentication. The process involves two key phases – Identity Creation and Registration Phase, and Identity Authentication Phase. User data, following W3C DID standards, is split into mandatory and optional shares using a Secret Sharing Scheme. These shares are then stored on the blockchain and IPFS for authentication.

Source: www.nature.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts