Authentication and Identity Validation Blockchain Application

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The biggest obstacle to electronic migrations of many systems is the need to protect the details and to check the identity of users. Currently, the use of dual-factor authentication is based occasionally on a password. The problem with these approaches is that passwords are extremely insecure and authentication by two factors usually involves the sending of code via SMS or a third-party provider. The blockchain might be a solution to this problem. A 50 billion dollar currency is managed by blockchain. But authentication could be subject to the same cryptographic principles. Thus, blockchain authentication eliminates someone from maliciously modifying the ledger when they distribute a ledger to all network members. A majority of the network shall check its validity any time a block of data is attached to a chain. That guarantees the completeness of the ledger. You can then make sure to send passwords safely using public-key encryption, such as highly protected RSA encryption. The receiver could then search for an entry in the unchanged blockchain, which would result in a remarkably safe and reliable way of handling identity verification. These rules apply for the transformation into a stable, fast, reliable, and readily available service from the election process, state identifiers to dual-factor authentication.

Cite

CITATION STYLE

APA

Arun, N., Mathiyalagan, R., & Suchithra. (2021). Authentication and Identity Validation Blockchain Application. In Journal of Physics: Conference Series (Vol. 1979). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1979/1/012017

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free