Table 1 Comparison of OAuth2.0 with SSH-DAuth.

From: SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier

Factors

OAuth2.0

SSH-DAuth

Centralization

Centralized

Decentralized

DID Enabled

Not used

Used

Data confidentiality

Public key infrastructure

Secret Sharing

Data privacy

Not anonymous

Pseudo-anonymous

Availability

Single point of failure

No downtime

Transaction anonymity

Not Anonymous

Pseudo-anonymous