Research Article
A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain
Table 1
Security features’ comparison.
| Features | [34] | [35] | [36] | [13] | [21] | Our |
| Identity anonymity | | | | | | | Authentication | | | | | | | Nonrepudiation | | | | | | | Privacy preservation | | | | | | | Scalability | — | — | | | | | Decentralized | — | — | | | | | Cross-blockchain | — | — | | | | | Blockchain confirmation | — | — | | | | |
|
|