Research Article
Decentralized, Privacy-Preserving, Single Sign-On
Figure 2
The generic flow diagram shows the authentication phase of a password-based token method. The figure does not include the registration phase where the users store their username (usr) and hashed password (h) with the identity provider.