{"id":"https://openalex.org/W7124151615","doi":"https://doi.org/10.1007/s44443-025-00462-z","title":"MDID: a multi-layer blockchain-based secure and scalable decentralized identity scheme for web 3.0","display_name":"MDID: a multi-layer blockchain-based secure and scalable decentralized identity scheme for web 3.0","publication_year":2026,"publication_date":"2026-01-14","ids":{"openalex":"https://openalex.org/W7124151615","doi":"https://doi.org/10.1007/s44443-025-00462-z"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00462-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00462-z","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-025-00462-z","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018578258","display_name":"Qi Yu","orcid":"https://orcid.org/0000-0003-4786-3623"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]},{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN","MY"],"is_corresponding":false,"raw_author_name":"Qilong Yu","raw_affiliation_strings":["Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","School of Computer and Communication Engineering, Northeastern University at Qinhuangdao, Qinhuangdao, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"School of Computer and Communication Engineering, Northeastern University at Qinhuangdao, Qinhuangdao, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019715736","display_name":"Atikah Razali","orcid":null},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ahmad Syahidan Bin Razali","raw_affiliation_strings":["Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069933022","display_name":"Rosli Salleh","orcid":"https://orcid.org/0000-0002-7379-8397"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Rosli Bin Salleh","raw_affiliation_strings":["Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018629387","display_name":"Saaidal Razalli Azzuhri","orcid":"https://orcid.org/0000-0001-8603-8840"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Saaidal Razalli Bin Azzuhri","raw_affiliation_strings":["Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5069933022"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09075231,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.39570000767707825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.39570000767707825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.15129999816417694,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.06719999760389328,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7330999970436096},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5950999855995178},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.5145999789237976},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4803999960422516},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.46619999408721924},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.4348999857902527},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.423799991607666},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.42160001397132874},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.41510000824928284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7718999981880188},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7330999970436096},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5950999855995178},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.5145999789237976},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5029000043869019},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4828999936580658},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4803999960422516},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.46619999408721924},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.4348999857902527},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.423799991607666},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.42160001397132874},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.41510000824928284},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.40849998593330383},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.39329999685287476},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37880000472068787},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3653999865055084},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C164100034","wikidata":"https://www.wikidata.org/wiki/Q1870629","display_name":"Loose coupling","level":2,"score":0.3537999987602234},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.28940001130104065},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.28700000047683716},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.2727999985218048},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.27070000767707825},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2702000141143799},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.257999986410141},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2526000142097473}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00462-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00462-z","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7836bc9246bb482cab122dec19818738","is_oa":true,"landing_page_url":"https://doaj.org/article/7836bc9246bb482cab122dec19818738","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 2 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00462-z","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00462-z","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5963645577430725,"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2013608896","https://openalex.org/W3046248117","https://openalex.org/W3108722340","https://openalex.org/W3120066598","https://openalex.org/W3161441563","https://openalex.org/W3176994216","https://openalex.org/W3186069929","https://openalex.org/W3198185738","https://openalex.org/W3200276483","https://openalex.org/W3202149324","https://openalex.org/W3208793834","https://openalex.org/W4210520566","https://openalex.org/W4283367556","https://openalex.org/W4295935146","https://openalex.org/W4316021905","https://openalex.org/W4317382089","https://openalex.org/W4323519423","https://openalex.org/W4367281236","https://openalex.org/W4382195294","https://openalex.org/W4385187371","https://openalex.org/W4386928806","https://openalex.org/W4391306366","https://openalex.org/W4393028961","https://openalex.org/W4393033150","https://openalex.org/W4394804953","https://openalex.org/W4396783485","https://openalex.org/W4399665726","https://openalex.org/W4400976601","https://openalex.org/W4401839889","https://openalex.org/W4402156778","https://openalex.org/W4402897152","https://openalex.org/W4403563824","https://openalex.org/W4404257738","https://openalex.org/W4409205059","https://openalex.org/W4413196917"],"related_works":[],"abstract_inverted_index":{"The":[0,93],"rapid":[1,108],"evolution":[2],"of":[3,25,95,114],"Web":[4,53,165],"3.0":[5,166],"demands":[6],"decentralized":[7,161],"identity":[8,144,162],"management":[9,105,163],"systems":[10],"that":[11,60],"are":[12],"secure":[13],"and":[14,29,63,81,91,109,112,139,146,159],"scalable.":[15],"Existing":[16],"Decentralized":[17],"Identity":[18],"(DID)":[19],"solutions":[20],"struggle":[21],"with":[22],"single":[23],"points":[24],"failure":[26],"(SPOF),":[27],"forgeability,":[28],"limited":[30],"scalability":[31,64],"challenges,":[32,42],"restricting":[33],"their":[34],"applicability":[35],"in":[36,129,136,164],"large-scale":[37,137],"ecosystems.":[38,167],"To":[39],"address":[40],"these":[41],"we":[43],"propose":[44],"MDID,":[45],"a":[46,57,152],"multi-layer":[47],"blockchain-based":[48],"DID":[49,67,104],"framework":[50],"optimized":[51],"for":[52,155],"3.0.":[54],"MDID":[55],"features":[56],"four-layer":[58],"architecture":[59],"enhances":[61],"interoperability":[62],"across":[65],"diverse":[66],"systems.":[68],"Security":[69],"is":[70],"reinforced":[71],"through":[72],"the":[73,82,96],"Redundant":[74],"Byzantine":[75],"Fault":[76],"Tolerance":[77],"(RBFT)":[78],"consensus":[79],"protocol":[80],"threshold":[83],"signature":[84],"algorithm,":[85],"ensuring":[86],"robust":[87],"decentralization,":[88],"SPOF":[89],"mitigation,":[90],"unforgeability.":[92],"introduction":[94],"Sharded":[97],"Merkle":[98],"Patricia":[99],"Tree":[100],"(SMPT)":[101],"further":[102],"optimizes":[103],"by":[106],"enabling":[107],"efficient":[110,160],"storage":[111],"retrieval":[113],"(DID,":[115],"Metadata)":[116],"key-value":[117],"pairs.":[118],"Experimental":[119],"results":[120],"demonstrate":[121],"MDID\u2019s":[122],"superior":[123],"performance,":[124],"achieving":[125],"cross-domain":[126],"credential":[127],"verification":[128],"2":[130],"seconds,":[131],"maintaining":[132],"high":[133],"operational":[134],"efficiency":[135],"environments,":[138],"offering":[140],"strong":[141],"resistance":[142],"to":[143],"forgery":[145],"system":[147],"disruptions.":[148],"This":[149],"work":[150],"lays":[151],"critical":[153],"foundation":[154],"advancing":[156],"secure,":[157],"scalable,":[158]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2026-01-15T00:00:00"}
