Research Article

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Table 2

Authentication.

User (U)Server (S)Blockchain (B)

Input ID, psw
Choose T
Encrypted message with k
{T, ID, psw′} k
Decrypt k
Verify whether T is correct
Calculate H (ID, psw)? = H (ID, psw′)
No, return a wrong message
{T, Fal} k

{T, Req}

Secure channel
Return access right
{T, ID, A}

Secure channel
Verify ID consistency (ID, ID, Θ)? = 1
Yes
Verify whether A is accessible
Yes
{T, Suc} k

No
{T, Fal} k