Abstract: Background: This article aims to address the issues of inaccurate trust evaluation, low communication efficiency, and insufficient security in traditional identity authentication systems, ...