Research Article

Decentralized, Privacy-Preserving, Single Sign-On

Figure 2

The generic flow diagram shows the authentication phase of a password-based token method. The figure does not include the registration phase where the users store their username (usr) and hashed password (h) with the identity provider.