Table 1 Comparison of OAuth2.0 with SSH-DAuth.
From: SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier
Factors | OAuth2.0 | SSH-DAuth |
---|---|---|
Centralization | Centralized | Decentralized |
DID Enabled | Not used | Used |
Data confidentiality | Public key infrastructure | Secret Sharing |
Data privacy | Not anonymous | Pseudo-anonymous |
Availability | Single point of failure | No downtime |
Transaction anonymity | Not Anonymous | Pseudo-anonymous |