S Gao, Q Su, R Zhang, J Zhu, Z Sui… - Security and …, 2021 - Wiley Online Library
Traditional identity authentication solutions mostly rely on a trusted central entity, so they
cannot handle single points of failure well. In addition, most of these traditional schemes …