Research Article
Risk-Based Dynamic Identity Authentication Method Based on the UCON Model
| User (U) | Server (S) | Blockchain (B) |
| Input ID, psw′ Choose T Encrypted message with k {T, ID, psw′} k
| | | | Decrypt k Verify whether T is correct Calculate H (ID, psw)? = H (ID, psw′) No, return a wrong message {T, Fal} k
{T, Req}
Secure channel | | | | Return access right {T, ID, A}
Secure channel | | Verify ID consistency (ID, ID, Θ)? = 1 Yes Verify whether A is accessible Yes {T, Suc} k
No {T, Fal} k
| |
|
|