Table 5 Comparison of Existing work with SSH-DAuth.
From: SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier
Technology | Soumyashree29 | Hadjer B.30 | Schiffman32 | Kumar37 | Padma38 | SSH-DAuth |
---|---|---|---|---|---|---|
Distributed | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
msBlockchain | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | Â | Â | \(\checkmark\) |
DID | Â | Â | Â | Â | Â | \(\checkmark\) |
IPFS | Â | Â | Â | Â | Â | \(\checkmark\) |
Secret sharing | Â | Â | Â | Â | Â | \(\checkmark\) |