Assuming this publication about multi-factor self-sovereign identity authentication:
Conference Paper A Blockchain Implementation for Configurable Multi-Factor Ch...
The question arises of how to manage a library for a challenge set that needs to be responded to by either a device, a system, an organization, or a human.