Figures
Abstract
Blockchain-based systems increasingly require authentication mechanisms that simultaneously preserve user privacy, support accountability, and enable efficient credential revocation. However, most existing anonymous authentication schemes rely on pairing-based cryptography which introduce high computational overhead and limit deploy ability on widely adopted blockchain platforms such as Ethereum. This paper presents BAAR, a Blockchain-based Anonymous and Revocable authentication framework designed entirely within the discrete logarithm setting over the secp256k1 elliptic curve. BAAR integrates Pedersen vector commitments, Schnorr-based zero-knowledge proofs, and a Merkle-tree-based dynamic accumulator to support anonymous and unlinkable authentication with selective attribute disclosure and public, auditable revocation. Authentication and proof verification are performed off-chain, while the blockchain maintains only a compact revocation state, significantly reducing on-chain computation and gas costs. A formal security analysis demonstrates unforgeability, unlinkability, attribute privacy, and revocation soundness under standard cryptographic assumptions in the random oracle model. A prototype implementation on Ethereum confirms that BAAR achieves low gas consumption, logarithmic-time revocation, and scalable performance with respect to both the number of users and attributes. These results indicate that BAAR provides a practical balance between strong privacy guarantees and deploy ability, making it suitable for real-world blockchain-based identity and access-control systems.
Citation: Ahmed M, Ahmad A, Zeshan F, Akram S (2026) BAAR: A framework for blockchain-based anonymous and revocable user authentication scheme. PLoS One 21(3): e0343696. https://doi.org/10.1371/journal.pone.0343696
Editor: Hu Xiong, University of Electronic Science and Technology of China, CHINA
Received: October 13, 2025; Accepted: February 10, 2026; Published: March 31, 2026
Copyright: © 2026 Ahmed et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: Code Availability: https://github.com/Ahmad1234567/BAAR-A-FRAMEWORK-FOR-BLOCKCHAIN-BASED-ANONYMOUS-AND-REVOCABLE-USER-AUTHENTICATION-SCHEME.git.
Funding: This work was supported and funded by the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University (IMSIU) (grant number IMSIU-DDRSP2603).
Competing interests: The authors have declared that no competing interests exist.
1. Introduction
User authentication is a fundamental component of modern digital security, ensuring that only authorized individuals are able to access sensitive data and digital services. Authentication factors are typically classified into three categories: knowledge-based (e.g., passwords), possession-based (e.g., tokens or smart cards), and attribute-based (e.g., biometrics such as fingerprints or facial recognition) [1,2]. While multi-factor approaches strengthen resilience against cyberattacks, large-scale data breaches — such as those affecting Facebook (2019), LinkedIn (2021), Yahoo (2014), Zoom (2020), and Baidu [3–8] — reveal that billions of user credentials and attributes remain vulnerable. Beyond credential leakage, the rise of location-based services such as Google Maps and Baidu Maps also poses risks to privacy and physical safety [9,10].
These incidents underscore the pressing need for authentication systems that offer both robust security and privacy protection. Blockchain-based systems increasingly rely on authentication mechanisms to regulate access to decentralized services and digital assets. However, existing authentication approaches face difficulty in simultaneously satisfying three competing requirements: strong user anonymity, effective credential revocation, and practical deploy ability on widely used blockchain platforms. Many privacy-preserving authentication schemes achieve anonymity through pairing-based cryptography or complex zero-knowledge constructions, which introduce substantial computational overhead and limit compatibility with standard blockchain infrastructures such as Ethereum [11,12]. As a result, these schemes are often unsuitable for real-world deployment scenarios where efficiency, scalability, and interoperability are critical.
The problem addressed in this work arises from the absence of a practical blockchain-based authentication framework that can jointly support anonymity, unlinkability, selective revocation, and compatibility with existing blockchain platforms without relying on computationally expensive cryptographic primitives [13–16]. In particular, the reliance on pairing-friendly curves and circuit-intensive proof systems in many existing designs hinders adoption on platforms that natively employ the secp256k1 elliptic curve, including Bitcoin, Ethereum, and Hyperledger Fabric [17,18]. Although recent studies have explored privacy-preserving mechanisms based on secp256k1 [19], most existing anonymous credential systems continue to depend on pairing-based constructions, limiting their scalability and deploy ability. Prior comparative analyses indicate that secp256k1, when combined with Schnorr-based protocols, offers an efficient cryptographic foundation for blockchain-oriented anonymity and authentication [20]. This study focuses on the design and evaluation of an anonymous authentication framework for blockchain-based environments. The proposed work addresses credential issuance, authentication, selective attribute disclosure, and revocation, which are central to privacy-preserving access control in decentralized systems. The framework is designed for blockchain platforms based on the secp256k1 elliptic curve, with Ethereum used as a representative deployment environment for maintaining a publicly auditable revocation state. The security analysis considers standard cryptographic assumptions relevant to anonymous authentication and credential revocation.
In relation to existing research on blockchain-based anonymous authentication, this work contributes to the literature by addressing the gap between theoretically expressive privacy-preserving schemes and frameworks that are practically deployable on widely adopted blockchain platforms. Prior studies predominantly rely on pairing-based cryptography or general-purpose zero-knowledge systems, which provide strong security guarantees but incur substantial computational and implementation complexity. In contrast, this work demonstrates how established discrete-logarithm–based primitives can be systematically combined to support anonymity, selective disclosure, and efficient public revocation within the constraints of current blockchain infrastructures. By emphasizing deploy ability alongside privacy guarantees, the proposed approach extends the applicability of anonymous authentication mechanisms to real-world blockchain systems. In response to these challenges, this paper presents the Blockchain-based Anonymous and Revocable authentication (BAAR) framework, which operates entirely in the discrete logarithm setting over the secp256k1 elliptic curve, ensuring compatibility with existing blockchain platforms [21,22]. BAAR integrates Pedersen vector commitments, Schnorr-based zero-knowledge proofs, and a Merkle-tree-based dynamic accumulator to enable anonymous and revocable authentication with selective attribute disclosure [23]. The framework achieves anonymity, unlinkability, multi-attribute credential support, and efficient public revocation while maintaining lightweight computation and practical deploy ability under standard security assumptions.
1.1. Contributions
The contributions of this work are summarized as follows:
- Practical authentication framework compatible with deployed blockchains: This work presents a blockchain-based anonymous authentication framework that operates entirely in the discrete logarithm setting over the secp256k1 elliptic curve. The proposed design avoids pairing-based cryptography and circuit-intensive proof systems, ensuring compatibility with widely deployed blockchain platforms such as Ethereum.
- Anonymous and unlinkable authentication with public revocation: The proposed framework supports anonymous and unlinkable user authentication while enabling efficient and transparent credential revocation through a Merkle-tree-based dynamic accumulator. This approach allows revoked credentials to be invalidated without revealing user identities or affecting non-revoked users.
- Multi-attribute credentials with selective disclosure: The scheme supports credentials bound to multiple attributes using Pedersen vector commitments. During authentication, users can selectively disclose only the required attributes, while undisclosed attributes remain cryptographically protected.
- Efficient separation of off-chain verification and on-chain state management: Schnorr-based zero-knowledge proofs and signature verification are performed off-chain, whereas the blockchain is used solely to maintain the revocation state. This separation significantly reduces on-chain computational overhead and gas consumption while preserving public auditability.
- Security analysis under standard cryptographic assumptions: The security properties of the proposed framework, including unforgeability, unlinkability, attribute privacy, and revocation soundness, are analyzed under standard discrete-logarithm–based assumptions in the random oracle model.
- Prototype implementation and experimental evaluation: A prototype implementation on Ethereum is developed to evaluate the practical performance of the proposed framework. Experimental results demonstrate low on-chain gas costs, logarithmic revocation overhead, and scalability with respect to the number of attributes.
The remainder of this paper is organized as follows. Section 2 reviews the related work. Section 3 introduces the necessary cryptographic preliminaries and presents the BAAR system model. Section 4 outlines the BAAR security model and formal security assumptions. Section 5 details the proposed BAAR scheme, including its design and operational phases. Section 6 presents the model implementation and evaluates the performance of the scheme in terms of computational overhead, gas consumption, revocation efficiency, and scalability. Section 7 concludes the paper.
2. Literature review
This section discussed the anonymous authentication schemes with an emphasis on anonymity, revocation, efficiency, and suitability for blockchain applications. While many solutions have been proposed which most suffer from high computational cost, weak revocation, limited scalability, and motivating the need for more practical designs.
Early research work as reported in literature [24–27,28,29] explored the application of randomization methods and identity based cryptographic primitives as a means of achieving anonymity. However, they faced significant challenges in scalability, attribute privacy, and revocation, limiting their applicability in decentralized environments. Wang et al. [30] extended the identity mixer framework [31] with zero-knowledge proofs to allow selective disclosure of attributes. It improved privacy but it did not offer full anonymity with efficient revocation mechanisms. The authors [32] suggested a computationally efficient and pairing -free aggregate signature scheme, which is especially applicable for blockchain. But it suffered of high computational costs and reliance on third-party. Khalid et al. [33] proposed an authentication system based on blockchain. The articulated technique resolved the problems involved with existing remote authentication techniques. The suggested model did not help to alleviate scalability problems. Bisht et al. [34] proposed a revocation system of anonymous credentials using a threshold on blockchain as a means of reducing the revocation inefficiency of earlier systems. Sonnino et al. [35] presented a selective disclosure credential scheme including blockchain technology to maintain secret and authenticity, but this scheme lacks the revocation mechanism, which is considered a critical aspect to implement in the real world environment. Yang et al. [13] presented an aggregation signcryption scheme without certifies and anonymity which is proposed to be used in Vehicular Ad Hoc Network (VANET) safety warning systems. Although the scheme has the benefit of preserving privacy, it requires the assistance of a trusted authority and expensive bilinear pairings. Therefore, it has limiting scalability in large, real-time settings. Wang et al. [14] proposed a 6G revocation system that uses the RSA multi-accumulators and blockchain technology to optimize the latency and load balancing. The main disadvantage of this method is that it has a high computational cost, thus it is not applicable in lightweight blockchain systems. Wang and Zhang [15] proposed a selective disclosure model, which uses Merkle-based data structure and zero-knowledge Succinct Non-Interactive ARguments of Knowledge (zkSNARKs) to safeguard identity data. The scheme was later generalized to multi-attribute credentials but the cost of generating zk-SNARKs, combined with the cost scaling with the number of attributes of maintaining the Merkle paths which leading to higher validation latency. Yu et al. [16] proposed a system that combines dynamic accumulators, digital signatures, and zero-knowledge proofs with the help of a blockchain ledger. Although this technique supports selective revocation and multi-attribute privacy, the multi-round nature of the protocol provisional cost is significant. Yang et al. [36] introduced Zero-Cerd which was a self-blindable anonymous authentication system that uses dynamic accumulators. Even though there is a reduction in privacy and linkability in the scheme, it has a high overhead in terms of communication and computation. Shi et al. [37] introduced the concept of selective disclosure that replaces zero-knowledge proofs with unlinkable redactable signatures based on polynomials constructions, which lowers the cost of disclosure computation. However, this strategy is not concerned with the effectiveness of operations in the underlying chain. Ahmed et al. [38] proposed a shard-chain blockchain system that is aimed at increasing scalability and efficiency, with the distribution of transactions and smart contracts between parallel chains. The strategy aims at reducing the transaction latency and storage overhead and at the same time enhancing the overall system performance in Ethereum-based environments. Khan et al. [39] suggested a lightweight and scale able hybrid authentication infrastructure of the Internet of Medical Things (IoMT) settings, combining the Hyperledger Indy consortium blockchain with edge computing. The protocol alleviates the efficiency of authentication and minimizes the latency by implementing permission blockchain infrastructures and proxy-based cryptographic schemes. Xiong et al. [40] proposed an attribute-based encryption scheme to enable fine-grained access-control for digital twins with revocable feature. The scheme concentrates on the data confidentiality and it is based on the pairing cryptography. Wang et al. [41] introduced the proxy re-encryption scheme of the safe cross-system information sharing in clouds. The design team is geared towards the encrypted data management where the structures are built using pairing-based technique. Existing blockchain-based anonymous authentication systems present a wide range of cryptographic features in order to support privacy, revocation and accountability. Even though the given methodologies offer strong security guarantees, many of them focus on generality or expressive proof systems, which makes them have more severe computational overheads or less compatibility with prevalent blockchain infrastructures. In this context, BAAR framework is placed as a viable option that highlights deploy ability under the limitation of modern blockchain platforms. The BAAR system, using only discrete-logarithm based primitives, with a Merkle tree-based revocation scheme, is an example of how well-known cryptographic mechanisms can be designed to provide such properties as anonymity, selective disclosure, and revocation on a large scale. The role of BAAR towards this positioning is that it is a consistent framework on which viable deployment parameters can be based in tandem with security guarantees.
As Table 1 indicates, no prior work simultaneously provides (i) pairing-free operation on secp256k1, (ii) multi-attribute selective disclosure with lightweight zero knowledge, and (iii) public, logarithmic-time revocation suitable for on-chain publication. BAAR fills this gap by combining Pedersen vector commitments, Schnorr signature, and a Merkle-based dynamic accumulator, yielding an efficient and deployable construction without pairings.
3. Preliminaries and BAAR system
This section introduces the cryptographic preliminaries and system entities used in BAAR. The system first defines mathematical assumptions and then presents the overall proposed system model Table 2.
3.1. Preliminaries
All cryptographic primitives in BAAR are instantiated over the secp256k1 elliptic-curve group of prime order
. This ensures efficiency and compatibility with widely deployed blockchain ecosystems such as Ethereum. In BAAR, the security of all core mechanisms is grounded in the hardness of the elliptic-curve discrete logarithm problem (ECDLP) on secp256k1 [42]. Specifically, Schnorr signatures for authentication, Pedersen commitments for attribute binding, and the associated ZKPoK are all constructed within this discrete-logarithm setting.
- A. System Parameters
BAAR is instantiated over the secp256k1 elliptic curve defined by parameters , where
is the prime modulus and
define the curve equation
. The base point
generates a subgroup of prime order
with cofactor
. All cryptographic operations are carried out in this subgroup, and the security of the scheme relies on the hardness of the ECDLP. To support multi-attribute credentials, the system additionally selects a set of independent generators
, where
denotes the maximum number of attributes per credential. Together with the blinding generator
, these constitute the public parameters for Pedersen vector commitments [43]. For an attribute vector
, the credential commitment is computed as
where is a random blinding factor. This binding forms the cryptographic basis for selective disclosure and zero-knowledge proofs in BAAR.
- B. Assumption
Let be a prime modulus, and let the elliptic curve over
be defined by the equation
. Let
be the subgroup generated by the base point
, with prime order
and cofactor
. We assume the hardness of the ECDLP: given
for uniformly random
, no probabilistic polynomial-time adversary can recover
. All hash functions
are modelled as random oracles, i.e., idealized functions that output uniformly random values in
.
- C. Pedersen Vector Commitments and Zero-Knowledge Proofs
BAAR employs Pedersen vector commitments to protect user attributes. For an attribute vector and a random blinding factor
, the commitment is defined as equation 1.
where is the blinding generator and
are independent generators for each attribute. These commitments are perfectly hiding, as they reveal nothing about the attribute values and binding, since opening to different values would require solving the ECDLP on secp256k1. To prove the correctness of a commitment without revealing the attributes, BAAR employs ZKPoK of the form.
This proof follows a standard Σ-protocol made non-interactive using the Fiat–Shamir heuristic [44], resulting in short transcripts that are efficient to verify. Crucially, the protocol supports selective disclosure: the prover may reveal a chosen subset of attributes while proving knowledge of the remaining hidden ones. This enables fine-grained privacy and unlinkability while maintaining lightweight verification on the secp256k1 curve.
- D. Schnorr Signatures
BAAR utilizes Schnorr signatures over the secp256k1 curve for user authentication. A user selects a secret key with the corresponding public key
. To sign a message
, the signer chooses a random nonce
, computes the commitment
, derives the challenge
, and outputs the response
, forming the signature
. Verification consists of recomputing
and checking
. Security follows from the hardness of the ECDLP in the random oracle model.
- E. Dynamic Accumulator
For credential revocation, BAAR employs a hash-based dynamic accumulator implemented as a Merkle tree, instantiated with a collision-resistant hash function . Each credential identifier
is mapped to a leaf
, and the accumulator value is defined as the Merkle root
. A membership witness for credential
is the authentication path
consisting of sibling hashes up to the root, and verification checks whether the recomputed root satisfies
. Dynamic updates, such as adding or revoking a credential, require modifying only
nodes along the affected path. At the same time, all other witnesses remain valid except for siblings on that path. Security relies on the collision resistance of
: valid members can always reconstruct the root, whereas non-members cannot forge valid paths without breaking the hash assumption. This provides efficient selective revocation and integrates naturally with BAAR’s ZKPoK over the secp256k1 curve. Prior works [45–47] confirm the efficiency of Merkle trees as accumulators, demonstrating their suitability in discrete logarithm-based environments.
3.2. BAAR system
The BAAR model comprises four entities: the blockchain, the Credential Issuing Authority (CIA), verifiers, and users, as shown in Fig 1.
- Blockchain: A public ledger that publishes system parameters, public keys, and the current Merkle accumulator root for credential validity.
- CIA: Initializes the system by generating keys and parameters, issues Pedersen-based credential commitments to users (supporting both single and multi-attribute credentials), and updates the accumulator root to reflect revocation.
- Verifiers: Retrieve the latest accumulator root from the blockchain and validate user credentials using Schnorr signatures and ZKPoK proofs.
- Users: Obtain system parameters, request credentials from the CIA, and later prove membership and attributes to verifiers. In the multi-attribute setting, users may selectively disclose only the required subset of attributes while keeping the rest hidden. Upon revocation, users coordinate with the CIA to refresh their Merkle witnesses.
3.3. BAAR syntax for anonymous authentication
An anonymous authentication scheme with selective revocation consists of the following steps:
- Setup
: Takes the security parameter
and outputs the public system parameters
.
- KeyGen
: Each user samples a private key
and computes the public key
. The CIA initializes the on-chain Revoked Credential List
.
- Issue
: An interactive protocol between a user and the CIA. The user commits to a vector of attributes
and proves possession of
. The CIA issues a credential
without learning the values of
.
- Request
: The user generates a non-interactive ZKPoK
of credential possession, together with a Merkle membership witness. In the multi-attribute setting, the proof supports the selective disclosure approach.
- Verify
: The verifier checks proof
under public key
; outputs
if valid and otherwise
.
- Deactivate
: The CIA deactivates a credential by adding its identifier to the revocation list and publishing the updated root
on-chain.
- Recover
:A user can obtain a fresh credential through re-issuance if the old one is lost or expired.
- Revoke
: The CIA revokes a credential by updating the revocation list and publishing the new root
on-chain.
3.4. BAAR security model
3.4.1. Security assumptions.
BAAR is analyzed in the random oracle model (ROM) over the secp256k1 elliptic-curve group of prime order
.
- A1 – Discrete Logarithm Hardness: Given a generator
and a public key
for some secret
, no probabilistic polynomial-time adversary can recover
with non-negligible probability.
- A2 – Schnorr Signature Security: Schnorr signatures are existentially unforgeable under chosen-message attacks (EUF-CMA) in the ROM, assuming the hardness of ECDLP.
- A3 – ZKPoK Security: ZKPoK for Pedersen commitments (including vector commitments over multiple attributes), when made non-interactive via the Fiat–Shamir heuristic, are sound and zero-knowledge in the ROM.
- A4 – Merkle Accumulator Soundness: No adversary can produce a valid membership witness
for an element
without breaking the collision resistance of the hash function
.
- A5 – Hash Function Security: All hash functions used in Schnorr signatures, Pedersen commitments, and Merkle accumulators are modeled as random oracles and assumed to be collision-resistant.
3.4.2. Security games.
BAAR defines its security through the following standard indistinguishability games between a challenger and an adversary
.
- 1- Unforgeability: The adversary
interacts with an issuing oracle to obtain credentials of its choice. Finally, it outputs a transcript
. The game outputs 1 if
for a credential not issued to
. Formally,
Security reduces to the unforgeability of Schnorr signatures under ECDLP and the soundness of Pedersen-based ZKPoK. In the multi-attribute setting, unforgeability additionally ensures that an adversary cannot create a valid credential for an attribute vector it was never issued.
- 2- Credential Soundness: Let
denote the Merkle root of the set of valid credentials
. The adversary wins if it produces a witness
such that;
The advantage of is negligible under the collision resistance of the hash function
.
- 3- Unlinkability: The challenger generates credentials for two users
and
. It chooses a hidden bit
and outputs an authentication transcript for
. The adversary outputs a guess
. The unlinkability advantage is defined as
This property follows from the hiding of Pedersen commitments and the ZKPoK property of the proofs, which ensure that transcripts cannot be linked across sessions. In the multi-attribute case, unlinkability further guarantees that revealing one attribute does not compromise the privacy of undisclosed attributes.
- 4- Revocation Soundness: After a credential is revoked and the Merkle accumulator root updated, the adversary must not be able to produce a valid transcript
corresponding to the revoked credential. Formally,
3.4.3. Security argument.
BAAR achieves its security objectives under standard cryptographic assumptions, including unforgeability, credential integrity, attribute privacy, credential deactivation, selective revocation, and unlinkability.
- 1- Unforgeability: Only legitimate users holding valid credentials can generate authentication transcripts. Forging a transcript without a valid credential contradicts the existential unforgeability of Schnorr signatures
- 2- Credential Integrity: A verifier cannot be convinced of a credential that does not exist. This follows from Merkle accumulator soundness under the collision resistance of
.
- 3- Attribute Privacy. The CIA and verifiers learn nothing beyond explicitly disclosed attributes. In the multi-attribute setting, hidden attributes remain protected by Pedersen commitments and ZKPoK.
- 4- Credential Deactivation. Once revoked, a credential cannot be reused for authentication since verification will fail against the updated accumulator root.
- 5- Selective Revocation. The CIA can revoke credentials by updating the Merkle root without attribute disclosure. Any attempt to use a revoked credential succeeds only with negligible probability.
- 6- Unlinkability. Multiple presentations of the same credential cannot be correlated. Even in the multi-attribute setting, transcripts remain unlinkable even if some attributes are selectively disclosed
3.5. Multi-attribute security
The same security arguments apply to the multi-attribute setting, as the scheme was designed to support multiple attributes from the outset. Pedersen vector commitments preserve hiding and binding regardless of the number of attributes, ensuring that undisclosed attributes remain private while preventing forgery. The Schnorr-based ZKPoK is likewise extensible: users can jointly prove knowledge of all committed attributes or selectively disclose only a subset, without compromising soundness. Since each multi-attribute credential is a single entry in the Merkle accumulator, revocation remains unaffected and integrity is preserved.
Formally, let be a vector of attributes. The Pedersen commitment is:
To prove knowledge, the user samples and computes:
Given a challenge , responses are:
Verification succeeds if:
The equation (3) satisfies completeness and soundness: honest users pass, adversaries cannot forge consistent responses, and simulated transcripts leak nothing. Thus, BAAR supports multi-attribute credentials by design, without requiring additional cryptographic assumptions or complexity.
Details of BAAR Scheme:
The operation of BAAR is divided into four main phases—Request, Generation, Validation, and Verification—which collectively define the end-to-end lifecycle of anonymous and revocable user authentication, as illustrated in Fig 1.
- 1. Request Phase: In the request phase, a user initializes the process by sampling a key pair
and preparing an attribute vector
. The user then generates a temporary key pair
and computes a Pedersen vector commitment to the attribute vector,
Using a Schnorr-based Σ-protocol (Fiat–Shamir transformed), the user produces a ZKPoK demonstrating knowledge of the committed attributes and the blinding factor without revealing them. Finally, the user sends the credential issuance request to the CIA.
- 2. Generation Phase: Upon receiving the request, the CIA verifies both the ZKPoK
and the signature under
. If valid, the CIA inserts the commitment
into the Merkle accumulator, updating the root as
The updated accumulator root is published on-chain to ensure global verifiability, and the corresponding Merkle membership witness is returned to the user. At this point, the credential is officially issued and registered.
- 3. Validation Phase: In the validation phase, the user prepares for authentication. A subset of attributes
is selected for disclosure, while the remaining attributes stay hidden. The user constructs a selective-disclosure ZKPoK
attesting to the committed but undisclosed attributes, and signs the proof and Merkle witness with their temporary private key, producing
The user then sends to the verifier.
- 4. Verification Phase: The verifier performs three checks to validate the authentication:
- Signature verification:
.
- ZKPoK verification:
.
- Accumulator membership verification:
.
- Signature verification:
If all checks succeed, the verifier accepts the authentication. This phase ensures that only valid, non-revoked credentials are accepted, while preserving user anonymity and selective disclosure.
- 5. Revocation (for completeness): On revocation of
publish on-chain. Any future proof using
fails.
against the updated
.
3.5.1. Protocol correctness.
Protocol 1: ZKPoK for Pedersen Vector Commitments (Credential Issuance): A user proves knowledge of committed attributes without revealing them. Let the attribute vector be and the commitment
The user chooses and computes
sending to the CIA. The CIA chooses a random challenge
. The user responds with
Verification succeeds if
Equation (5) for honest users, this holds by construction.
Protocol 2: Schnorr Signature-Based Authentication: For authentication, BAAR uses Schnorr signatures over secp256k1. A user with a secret and public
signs message
:
- Pick
, compute
- Compute
- Output
, signature
.
Verification recomputes and checks:
Equality holds for honest signers, ensuring correctness.
Protocol 3: Revocation via Merkle Accumulator: Each credential commitment is mapped to a leaf identifier;
Leaves form a Merkle tree with a root
, representing all valid credentials. To revoke, the CIA removes
and publishes the new root
During authentication, the user must present a Merkle witness
verifying
If revoked as shown in equation (6), no valid exists. Forging one would require breaking hash collision resistance, ensuring transparent and public revocation. The overall communication flow of the protocol 1–3 as shown in Fig 2.
3.6. Security analysis
The BAAR scheme achieves the core security goals of unforgeability, credential soundness, attribute privacy, anonymity, and selective revocation. These properties are grounded in the hardness of the ECDLP, the unforgeability of Schnorr signatures [22], and the collision-resistance of the underlying hash functions used in Pedersen commitments and the Merkle accumulator [23]. In particular, no probabilistic polynomial-time (PPT) adversary can produce a valid authentication transcript without possessing a credential issued by the authority, thereby ensuring the system’s unforgeability.
Lemma 1 (Unforgeability). No PPT adversary can produce a valid authentication transcript without possessing a credential issued by the authority.
Proof: Suppose an adversary can output a valid transcript without a credential. Then, in particular, it must forge a Schnorr signature under some public key
without knowing the secret
. In the Schnorr scheme, the signer selects
, computes
, derives
, and outputs
. Verification succeeds if
If produces two valid transcripts
and
for the same
but distinct challenges
, then the secret key can be extracted as
, Breaking the elliptic-curve discrete logarithm assumption. Since ECDLP is hard on secp256k1, the probability of
succeeding is negligible. Therefore, Schnorr signatures remain existentially unforgeable under chosen-message attacks (EUF-CMA) in the random oracle model, and BAAR inherits this unforgeability.
Lemma 2 (Credential Soundness). No PPT adversary can authenticate with a credential that was never issued.
Proof: Let be the Merkle root of the set of issued credentials
. A valid membership proof consists of a pair
such that
If but
is accepted, then the adversary has constructed a Merkle path that maps a non-member element
to the published root
. This requires producing two distinct input pairs
and
with
which is a collision in the hash function . Since
is assumed to be collision-resistant; the probability that a PPT adversary succeeds is negligible. Therefore, no adversary can authenticate with an unissued credential.
Lemma 3 (Attribute Privacy). BAAR preserves attribute privacy under the hiding property of Pedersen vector commitments and the zero-knowledge property of their Proofs: BAAR preserves attribute privacy under the hiding property of Pedersen vector commitments and the ZKPoK property of their proofs.
Proof. A credential is committed as
where is random. Pedersen vector commitments are perfectly hiding, so
reveals nothing about the attributes
. To prove correctness, the user provides
which can be simulated without knowledge of the attributes. Hence, transcripts leak no information beyond explicitly disclosed attributes, and hidden attributes remain private.
Lemma 4 (Anonymity). BAAR ensures that an adversary cannot link two valid authentication transcripts to the same user, even with multi-attribute credentials.
Proof: Each authentication uses a Schnorr signature with fresh randomness
, where
,
, and
. Since
is uniformly distributed in
and independent of the secret key
, transcripts
are indistinguishable across sessions. Attribute commitments
Also employ fresh randomness , and their ZKPoK can be simulated without the attributes. Selective disclosure reveals only chosen attributes while preserving the privacy of hidden ones. Thus, the joint transcript of Schnorr signatures, ZK proofs, and Merkle membership witnesses reveals nothing that allows linking across sessions. Formally, for any adversary
:
Hence, BAAR achieves unlinkability.
Lemma 5 (Revocation Soundness). No PPT adversary can authenticate using a revoked credential.
Proof: Let be the current Merkle root of all valid credentials and let
be a credential commitment that has been revoked. The CIA updates the accumulator root to
after removing
. For authentication, a user must provide a membership witness
such that
If is revoked, no valid witness
exists. To succeed, an adversary must forge
, which requires producing a hash collision in the Merkle tree construction. Since the hash function
is assumed to be collision-resistant, the probability of success is negligible. Thus, any attempt to authenticate with a revoked credential fails with overwhelming probability.
Lemma 6 (Authority-Forgery Resistance). A malicious authority cannot undetectably forge credentials or manipulate accumulator parameters.
Proof: Consider two attack types:
- i. Credential forgery: To authenticate as a user, the authority would need a valid transcript including a Schnorr signature under the user’s public key
. Producing such a signature without
contradicts Lemma 1 (Unforgeability) (EUF-CMA of Schnorr under ECDLP). Hence, impersonation is infeasible except with negligible probability.
- ii. Accumulator manipulation: Let
be the published Merkle root for the set
. If the authority publishes a tampered root
to make an unissued/revoked element
verify, it must provide
such that
This yields a Merkle path inconsistent with the original leaves, implying a hash collision in the tree. Since is collision-resistant, the success probability is negligible. Moreover, because
is publicly posted, any divergence
is detectable: honest users’ existing witnesses fail against
, exposing the manipulation. Therefore, the authority cannot forge user credentials or alter the accumulator without detection, except with negligible probability
Lemma 7 (Selective-Disclosure Soundness & Privacy). Given a credential commitment
for any disclosed index set and hidden set
, no PPT adversary can (i) produce values
and a proof that verifies against
unless
for all
, nor (ii) learn any information about
beyond what is computationally implied by the disclosure.
Proof (sketch):For (i) (soundness), the verifier checks a ZKPoK of knowledge of with
. By Σ-protocol soundness, any accepting proof implies knowledge of witnesses that open
; hence any forged
for
makes
inconsistent and cannot verify except with negligible probability. For (ii) (privacy), the proof system for the hidden coordinates is zero-knowledge: a simulator can produce accepting transcripts for
without the witnesses. Pedersen commitments are perfectly hiding, so
(and
) reveal nothing about
. Therefore, disclosures of
leak no additional information about hidden attributes beyond what is logically implied.
4. Model implementation and performance evaluation
4.1. System implementation setup
This section presents a comprehensive experimental evaluation of the BAAR scheme. The system is implemented using the Charm-Crypto library with secp256k1 primitives and integrated with the Ethereum blockchain through Solidity v0.8.25. All cryptographic components were instantiated using publicly defined parameters of the secp256k1 elliptic curve. Schnorr signatures and ZKPoK were implemented following standard discrete-logarithm–based constructions without reliance on pairing-based primitives. Pedersen commitments were realized using fixed generators selected during system initialization, and credential identifiers were deterministically derived from commitment values to ensure consistent accumulator behavior. The revocation scheme based on Merkle tree was suggested as a binary Merkle tree where the hash function used in the scheme was the collision resistant hash function of SHA-256. To remain interoperable with Ethereum—whose precompiled contracts natively support ECDSA but not Schnorr—root-update transactions are signed using standard secp256k1 keys. Therefore, user-side credentials are secured with the help of Schnorr proofs, and blockchain transaction authentication is achieved with the help of ECDSA. This division clarifies the distinction between cryptographic proof layer called off-chain and the ledger authentication layer called on-chain are different and the vagueness of the verification process is evaded. Ethereum plays as a transparent bulletin board that records the Merkle accumulator root and processes revocation updates, which ensure that credential status remains tamper-resistant and publicly auditable. Throughout the identity verification procedure, the verifiers get the most current Merkle root in the Ethereum blockchain and apply it to verify Schnorr signatures and ZKPoK. However, the experiments executed on a VMware virtual machine with Ubuntu 22.04.2, a RAM capacity of 8GB and a disk space of 25GB. The host platform was a CPU based on the Intel Core i5 -8350U with a speed of 1.70 GHz at base and 1.90 GHz at turbo and 16 GB RAM with Windows 11. The experiments were repeated forty times, and average gas consumption and transaction execution times for setup, validation, revocation, and recovery were recorded. The results are summarized in Table 3.
The implementation of BAAR is on the Ethereum blockchain using Ganache. The ZKPoK verifies the user’s identity without revealing sensitive attributes, while a unique nonce and Schnorr signature guarantee authenticity and integrity. The verifier checks the user’s public key , and the transaction time demonstrates the efficiency of the scheme.
Furthermore, Table 4 shown the computational complexity of the operations in BAAR is indicative of the fact that it is a lightweight algorithm, requires only a small number of elliptic-curve operations, and can scale with the number of users and attributes.
4.2. Computational overhead and performance analysis
Fig 3 presents a comparative performance evaluation of the proposed scheme against two baselines of anonymous credential systems [36], and [37]. The four key cryptographic operations were benchmarked: setup, key generation, revocation, and verification. For the setup phase, BAAR demonstrates the lowest computational cost ≈120 ms, [36] ≈190 ms, and [37] ≈160 ms. This reduction stems from BAAR’s pairing-free initialization over secp256k1, which avoids expensive bilinear map computations and uses lightweight parameter generation with Merkle accumulator initialization. During key generation, BAAR also exhibits superior efficiency ≈150ms compared to 23ms and 210ms for [36] and [37], respectively. Moreover, this improvement is due to the minimal interaction rounds between the user and the authority, as well as the use of Schnorr-based key derivation over discrete-logarithm groups, which replaces the heavy exponentiation and pairing operations present in the baselines. In the revocation phase, which is typically computationally demanding, BAAR achieves ≈180ms, significantly lower than [36] ≈280ms, and [37] ≈250ms.
This improvement represented the Merkle-tree based dynamic accumulator used by BAAR that achieves updates in the revocation state in logarithmic time, and thus avoiding the linear or quadratic update complexity of accumulator constructions of other schemes. The most prominent improvement is seen in verification, with BAAR requiring only about ≈200ms in comparison with 350ms and 320s of the baseline methods. Such efficiency comes as a result of the lightweight Schnorr verification of proofs and compact ZKPoK transcripts over secp256k1 to replace the pairing-intensive zero-knowledge protocols in [36] and [37] schemes. However, the proposed scheme consistently outperforms the baseline approaches during all the phases, with performance improvement of 25–50 percent, particularly during the verification.
4.3. Gas consumption analysis
Fig 4 compares the on-chain gas usage of the three most critical operations, namely, create, verify, and revocation of BAAR and the threshold credential scheme mentioned in [37]. Gas usage implies the number of computational resources used during the transaction and, therefore, a crucial performance parameter of the authentication systems based on blockchain technology. For the create operation, BAAR consumes approximately 110K gas, compared to ≈135K for [37]. This is due to the lightweight credential issuance protocol of BAAR that avoids pairing-based and threshold operations. In verification, BAAR has a lower gas consumption of about ≈60K than the about ≈100 K of [37], due to its application of Schnorr proofs over secp256k1 as opposed to pairing heavy ZKPoK verification. The most evident difference can be seen with the revocation: BAAR is using around ≈30 K gas, and the methodology presented in [37] contains more than around ≈270 K. As compared to the protocol described in [37], BAAR has a Merkle accumulator that allows revocation by simply hashing logarithmically, as compared to more expensive accumulator updates. Moreover, BAAR reduces its gas costs by 50–90% that directly transforms into reduced on-chain operational costs and increased scalability of its real deployments.
4.4. Revocation performance analysis
The efficiency of revocation is important in authentication systems. It needs proper revocation processes because a great number of credentials can be revoked. This scheme measures the performance of revocation using two mutually valid dimensions. Firstly, the cumulative update time the revocation performance of the accumulator between the revocation of the revoked credentials and secondly, the latency of a single revocation, thus the cost of the actual running-time of a single revocation. Fig 5 depicts, [14] has a definite linear increase in the revocation time that reaches about 5s after 5000 revocations. This performance is expected due to each additional revocation requires further modular exponentiation which resulting in cumulative computation overhead. In contrast to proposed scheme BAAR, the revocation time remains constant nonetheless of the number of revoked credentials.
This constancy made possible with the Merkle accumulator in BAAR, an update scheme with lightweight hash computation, and linear time. The revocation time in Fig 5 is mainly a reflection of accumulator working time, i.e., the computational cost of updating the underlying accumulator structure to go through the revocation process. These findings indicate the scalability of BAAR in the environments with large and frequently changing revocation lists.
Fig 6 further gives emphasis to per-revocation latency which shows the time taken to handle individual revocation. In [14], the revocation latency becomes stabilizes at 800–950 ms with an increase in the revoked credentials. This is due to the fact that [14] follows an on-verification witness update strategy which does not require direct batch updates but still requires proof operations with each verification.
BAAR has a low revocation latency, with an approximated latency of 200ms and gradually rising to around 310ms on 5000 credentials. Together, these finding highlight that BAAR is superior to [14] in terms of scalability and real-time revocation. BAAR attains significantly lower cumulative accumulator update time and per-revocation latency and is most suited to the high-revocation environment, where continuous update is needed as well as effective immediate verification
4.5. Performance and attribute privacy comparison
A comparison of the privacy and scalability performance of BAAR and the [15] in the four basic phases of operation named; request, generation, validation, and verification as shown in Figs 7 and 8. Fig 7 demonstrates that BAAR takes less time to execute as compare to [15] across all phases. Compared to approximately 0.0015 s and 0.004 s in [15], BAAR requires approximately 0.001 s and 0.003 s respectively on request and generation phases. The most significant difference between the performance is in the validation phase where BAAR takes 0.018 seconds which 36 percent higher than 0.028 seconds of reference [15] and a corresponding gain in the verification stage. This is accomplished using a computed on-chain lightweight Merkel checks architecture, which off-chain computes Schnorr proofs and verifies them, and does not use any costly computations and dense proof system. As a result, BAAR shows lower computation costs and greater scalability at all operational stages, which makes it a more suitable solution to implement real-world blockchain applications than the one proposed in [15].
Scalability is assessed in Fig 8 in terms of the number of attributes, which vary between 8 and 1,024. The near-linear scaling throughout all stages of development is shown in [15], although, particularly, in the stage of validation where the latency increases between ≈15s to over 33s. This growth primarily results from the inherent SNARK generation and Merkle path handling in [15], which scales proportionally with the size of the attribute vector.
In contrast, BAAR exhibits sublinear and stable performance across the same range. This efficiency is achieved through Pedersen vector commitments, enabling attributes to be committed using fixed-base scalar multiplications, and Schnorr-based ZKPoK, which introduces only low-cost linear growth without complex circuit generation. Additionally, the revocation mechanism of BAAR is not linked with the disclosure of attributes and allows to maintain low validation costs even in the case of large sets of attributes. In terms of privacy, both schemes provide high protection of attribute values though in different methods. The [15] utilize zk-SNARKs to obscure Merkle paths, which provide high path privacy especially in off-chain settings. Instead, BAAR uses Pedersen commitments and lightweight Schnorr proofs which are used for information hiding of undisclosed attributes while maintaining unlinkability, and are computationally efficient for on-chain verification. This efficiency, scalability, and privacy make BAAR especially suitable to blockchain-based identity systems that need to be publicly verifiable, and [15] is still tailored to the off-chain case where path privacy is of interest. As experimented, BAAR has always been noticeably better in terms of computational efficiency, gas usage and scalability, compared to baseline schemes. These results justify the architectural decisions that the BAAR is based on and emphasize its appropriateness to the real-life blockchain-based authentication systems where efficiency, scalability, and privacy must be balanced.
5. Conclusion
This paper introduced BAAR, a practical blockchain-based anonymous and revocable authentication framework compatible with secp256k1-based platforms such as Ethereum. By combining Pedersen vector commitments, Schnorr-based zero-knowledge proofs, and a Merkle-tree-based dynamic accumulator, BAAR enables anonymous and unlinkable authentication with selective attribute disclosure and efficient public revocation. The design avoids pairing-based cryptography and circuit-intensive proof systems, ensuring deploy ability on existing blockchain infrastructures. Formal analysis shows that BAAR satisfies unforgeability, attribute privacy, unlinkability, and revocation soundness under standard cryptographic assumptions in the random oracle model. A prototype implementation on Ethereum demonstrates low gas consumption, logarithmic-time revocation, and scalable performance with respect to both credentials and attributes. These results confirm that BAAR provides an efficient and deployable solution for privacy-preserving authentication in real-world blockchain systems.
References
- 1. Shah SW, Kanhere SS. Recent Trends in User Authentication – A Survey. IEEE Access. 2019;7:112505–19.
- 2. Chen Y, Bellavitis C. Blockchain disruption and decentralized finance: The rise of decentralized business models. Journal of Business Venturing Insights. 2020;13:e00151.
- 3.
Jordan Valinsky CB. Here’s How to Tell If Your Facebook Account Was One of the Half Billion That Were Breached. 2024 [cited July. 14, 2024]. Available from: https://edition.cnn.com/2021/04/05/tech/facebook-data-leaked-how-to-tell/index.html
- 4.
Andy BN. LinkedIn Hack: What You Need to Know. [cited July. 14, 2024]. Available from: https://www.ncsc.gov.uk/blog-post/linkedin-2012-hack-what-you-need-know
- 5.
News, B. ’One Billion’ Affected by Yahoo Hack [cited July 01, 2024]. Available from: https://www.bbc.com/news/world-us-canada-38324527
- 6.
Backdoor in Baidu Android SDK Puts 100 Million Devices at Risk [cited July, 01,2024]. Available from: https://thehackernews.com/2015/11/android-malware-backdoor.html
- 7.
China’s largest search engine hacked [cited July, 07,2024]. Available from: https://www.thehindu.com/sci-tech/technology/internet/Chinas-largest-search-engine-hacked/article16837165.ece
- 8.
Winder D. Zoom Gets Stuffed: Here’s How Hackers Got Hold of 500,000 Passwords [cited July, 07,2024]. Available from: https://www.forbes.com/sites/daveywinder/2020/04/28/zoom-gets-stuffed-heres-how-hackers-got-hold-of-500000-passwords/?sh=40c6a0315cdc
- 9. Mai W, Xiao Y. A novel GPU based Geo-Location Inference Attack on WebGL framework. High-Confidence Computing. 2023;3(4):100135.
- 10. Wu DJ, Zimmerman J, Planul J, Mitchell JC. Privacy-preserving shortest path computation. arXiv preprint arXiv:160102281. 2016.
- 11. Jiang Y, Zhang K, Qian Y, Zhou L. Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning. IEEE TransInformForensic Secur. 2022;17:2227–40.
- 12. Almazroi AA, Alqarni MA, Al-Shareeda MA, Alkinani MH, Almazroey AA, Gaber T. A Bilinear Pairing-Based Anonymous Authentication Scheme for 5G-Assisted Vehicular Fog Computing. Arab J Sci Eng. 2024;50(15):11757–78.
- 13. Yang Y, Zhang L, Zhao Y, Choo K-KR, Zhang Y. Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET. IEEE TransInformForensic Secur. 2022;17:317–31.
- 14. Wang G, Zou Y, Zhou J, Cui H, Ju Y. Efficient Multi-Layer Credential Revocation Scheme for 6G Using Dynamic RSA Accumulators and Blockchain. Electronics. 2025;14(15):3066.
- 15. Wang G, Zhang G. An Efficient Distributed Identity Selective Disclosure Algorithm. Applied Sciences. 2025;15(16):8834.
- 16. Yu Y, Zhao Y, Li Y, Du X, Wang L, Guizani M. Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications. IEEE Trans Ind Inf. 2020;16(5):3290–300.
- 17. Campanelli M, Hall-Andersen M, Kamp SH, editors. Curve trees: Practical and transparent {Zero-Knowledge} accumulators. 32nd USENIX Security Symposium (USENIX Security 23); 2023.
- 18. Manimaran P, Raikwar M, Garrett T, da Conceição AF, Jehl L, Vitenberg R. zkToken: Empowering Holders to Limit Revocation Checks for Verifiable Credentials. arXiv preprint arXiv:250911934. 2025.
- 19. Mercer R. Privacy on the blockchain: Unique ring signatures. arXiv preprint arXiv:161201188. 2016.
- 20. Sinai NK, In HP. Performance evaluation of a quantum-resistant Blockchain: a comparative study with Secp256k1 and Schnorr. Quantum Inf Process. 2024;23(3).
- 21.
curve. REsgAboSkE. 2010 [cited July, 28, 2024]. Available from: https://www.secg.org/sec2-v2.pdf
- 22. Claus-Peter S. Efficient signature generation by smart cards. J Cryptology. 1991;4(3):161–74.
- 23. Ozcelik I, Medury S, Broaddus J, Skjellum A. An overview of cryptographic accumulators. arXiv preprint arXiv:210304330. 2021.
- 24. Camenisch J, Lysyanskaya A, editors. Signature schemes and anonymous credentials from bilinear maps. Annual international cryptology conference. Springer; 2004.
- 25.
Yang Y, Cai H, Wei Z, Lu H, Choo K-KR, editors. Towards lightweight anonymous entity authentication for IoT applications. Australasian conference on information security and privacy. Springer; 2016.
- 26. Ruj S, Stojmenovic M, Nayak A. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds. IEEE Trans Parallel Distrib Syst. 2014;25(2):384–94.
- 27. Jia X, He D, Kumar N, Choo K-KR. A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing. IEEE Systems Journal. 2020;14(1):560–71.
- 28. Khan Aa, Ghodhbani R, Alsufyani A, Alsufyani N, Mohamed MA. Leveraging blockchain-integrated explainable artificial intelligence (XAI) for ethical and personalized healthcare decision-making: a framework for secure data sharing and enhanced patient trust. J Supercomput. 2025;81(15).
- 29. Khan AA, Laghari AA, Baqasah AM, Bacarra R, Alroobaea R, Alsafyani M, et al. BDLT-IoMT—a novel architecture: SVM machine learning for robust and secure data processing in Internet of Medical Things with blockchain cybersecurity. J Supercomput. 2024;81(1).
- 30. 王震, 范佳, 成林, 安红章, 郑海彬, 牛俊翔. Supervised anonymous authentication scheme. Journal of software. 2019;30(6):1705.
- 31. Camenisch J. Specification of the identity mixer cryptographic library. IBM Research– Zurich; 2010.
- 32. Sahoo SS, Chaurasiya VK. EASB: ECC based aggregate signature without bilinear pairing for blockchain. Multimed Tools Appl. 2023;83(12):34581–600.
- 33. Khalid U, Asim M, Baker T, Hung PCK, Tariq MA, Rafferty L. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Comput. 2020;23(3):2067–87.
- 34. Bisht K, Kansagra NY, Ali R, Shaik MS, Francis M, Kataoka K, editors. Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security; 2024.
- 35. Sonnino A, Al-Bassam M, Bano S, Meiklejohn S, Danezis G. Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers. arXiv preprint arXiv:180207344. 2018.
- 36. Yang K, Yang B, Wang T, Zhou Y. Zero-Cerd: A Self-Blindable Anonymous Authentication System Based on Blockchain. Chinese J Elect. 2023;32(3):587–96.
- 37. Shi R, Feng H, Yang Y, Yuan F, Li Y, Pang HH, et al. Threshold Attribute-Based Credentials With Redactable Signature. IEEE Trans Serv Comput. 2023;16(5):3751–65.
- 38. Ahmed M, Ahmad A, Zeshan F, Mirza HT. Enhancing blockchain efficiency and security: a shard-chain methodology with smart contract integration. World Wide Web. 2026;29(1).
- 39. Khan AA, Laghari AA, Alroobaea R, Baqasah AM, Alsafyani M, Alsufyani H, et al. A lightweight scalable hybrid authentication framework for Internet of Medical Things (IoMT) using blockchain hyperledger consortium network with edge computing. Sci Rep. 2025;15(1):19856. pmid:40473928
- 40. Xiong H, Qu Z, Huang X, Yeh K-H. Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things. IEEE J Select Areas Commun. 2023;41(10):3306–17.
- 41. Wang L, Lin Y, Yao T, Xiong H, Liang K. FABRIC: Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing. IEEE Trans Dependable and Secure Comput. 2023;20(6):5130–42.
- 42. Johnson D, Menezes A, Vanstone S. The Elliptic Curve Digital Signature Algorithm (ECDSA). IJIS. 2001;1(1):36–63.
- 43.
Camenisch J, Kiayias A, Yung M, editors. On the portability of generalized schnorr proofs. Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer; 2009.
- 44.
Fiat A, Shamir A, editors. How to prove yourself: Practical solutions to identification and signature problems. Conference on the theory and application of cryptographic techniques. Springer; 1986.
- 45.
Rosenberg M, White J, Garman C, Miers I, editors. zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure. 2023 IEEE Symposium on Security and Privacy (SP). IEEE; 2023.
- 46. Jhanwar MP, Tiwari PR. Trading accumulation size for witness size: A Merkle tree based universal accumulator via subset differences. Cryptology ePrint Archive. 2019.
- 47. Loporchio M, Bernasconi A, Di Francesco Maesa D, Ricci L. A survey of set accumulators for blockchain systems. Computer Science Review. 2023;49:100570.