Research Article
Risk-Based Dynamic Identity Authentication Method Based on the UCON Model
Table 1
User’s registration process.
| User (U) | Server (S) | Blockchain (B) |
| Input ID, psw Choose T Encrypt the message with k {T, ID, psw} k
| | | | Decrypt k Verify whether T is correct Get ID, psw Save H (ID, psw) safely Calculate (Pu, Pr) Calculate ID Sign Sig (ID) ⟶ Θ | | | {T, ID, etc.} Secure channel
| Generate initial right A based on risk Save (ID, etc., A) | | Return registration success information {T, Suc} k
| |
|
|