{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T11:49:19Z","timestamp":1773229759977,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:00:00Z","timestamp":1768348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T00:00:00Z","timestamp":1770768000000},"content-version":"vor","delay-in-days":28,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2024GFZD003"],"award-info":[{"award-number":["2024GFZD003"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s44443-025-00462-z","type":"journal-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T15:14:20Z","timestamp":1768403660000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MDID: a multi-layer blockchain-based secure and scalable decentralized identity scheme for web 3.0"],"prefix":"10.1007","volume":"38","author":[{"given":"Qilong","family":"Yu","sequence":"first","affiliation":[]},{"given":"Ahmad Syahidan Bin","family":"Razali","sequence":"additional","affiliation":[]},{"given":"Rosli Bin","family":"Salleh","sequence":"additional","affiliation":[]},{"given":"Saaidal Razalli Bin","family":"Azzuhri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"key":"462_CR1","doi-asserted-by":"publisher","unstructured":"Aublin P-L, Mokhtar SB, Quema V (2013) RBFT: redundant byzantine fault tolerance. https:\/\/doi.org\/10.1109\/icdcs.2013.53","DOI":"10.1109\/icdcs.2013.53"},{"key":"462_CR2","doi-asserted-by":"publisher","unstructured":"Baird L, Garg S, Jain A, Mukherjee P, Sinha R, Wang M, Zhang Y (2023). Threshold signatures in the multiverse. https:\/\/doi.org\/10.1109\/sp46215.2023.10179436","DOI":"10.1109\/sp46215.2023.10179436"},{"issue":"2","key":"462_CR3","doi-asserted-by":"publisher","first-page":"1524","DOI":"10.1109\/tii.2022.3206798","volume":"19","author":"Z Bao","year":"2023","unstructured":"Bao Z, He D, Khan MK, Luo M, Xie Q (2023) Pbidm: privacy-preserving blockchain-based identity management system for industrial internet of things. IEEE Trans Ind Inf 19(2):1524\u20131534. https:\/\/doi.org\/10.1109\/tii.2022.3206798","journal-title":"IEEE Trans Ind Inf"},{"key":"462_CR4","doi-asserted-by":"publisher","first-page":"56431","DOI":"10.1109\/access.2024.3389299","volume":"12","author":"TAAAA Bary","year":"2024","unstructured":"Bary TAAAA, Elomda BM, Hassan HA (2024) Multiple layer public blockchain approach for internet of things (iot) systems. IEEE Access 12:56431\u201356438. https:\/\/doi.org\/10.1109\/access.2024.3389299","journal-title":"IEEE Access"},{"issue":"16","key":"462_CR5","doi-asserted-by":"publisher","first-page":"27058","DOI":"10.1109\/jiot.2024.3399535","volume":"11","author":"Y Bian","year":"2024","unstructured":"Bian Y, Wang X, Jin J, Jiao Z, Duan S (2024) Flexible and scalable decentralized identity management for industrial internet of things. IEEE Internet Things J 11(16):27058\u201327072. https:\/\/doi.org\/10.1109\/jiot.2024.3399535","journal-title":"IEEE Internet Things J"},{"key":"462_CR6","doi-asserted-by":"publisher","first-page":"139009","DOI":"10.1109\/access.2021.3117588","volume":"9","author":"S Cucko","year":"2021","unstructured":"Cucko S, Turkanovic M (2021) Decentralized and self-sovereign identity: Systematic mapping study. IEEE Access 9:139009\u2013139027. https:\/\/doi.org\/10.1109\/access.2021.3117588","journal-title":"IEEE Access"},{"key":"462_CR7","unstructured":"Decentralized\u00a0Identity F (2023) DIF: decentralized identity foundation. https:\/\/identity.foundation\/"},{"issue":"8","key":"462_CR8","doi-asserted-by":"publisher","first-page":"2051","DOI":"10.1109\/tc.2024.3398509","volume":"73","author":"H Deng","year":"2024","unstructured":"Deng H, Liang J, Zhang C, Liu X, Zhu L, Guo S (2024) Futuredid: a fully decentralized identity system with multi-party verification. IEEE Trans Comput 73(8):2051\u20132065. https:\/\/doi.org\/10.1109\/tc.2024.3398509","journal-title":"IEEE Trans Comput"},{"issue":"9","key":"462_CR9","doi-asserted-by":"publisher","first-page":"6719","DOI":"10.1016\/j.jksuci.2022.03.007","volume":"34","author":"AG Gad","year":"2022","unstructured":"Gad AG, Mosa DT, Abualigah L, Abohany AA (2022) Emerging trends in blockchain technology and applications: a review and outlook. J King Saud Univ Comput Inf Sci 34(9):6719\u20136742. https:\/\/doi.org\/10.1016\/j.jksuci.2022.03.007","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"462_CR10","doi-asserted-by":"publisher","unstructured":"Garc\u00eda-Rodr\u00edguez J, Skarmeta A (2023) A privacy-preserving attribute-based framework for iot identity lifecycle management. Comput Netw 236. https:\/\/doi.org\/10.1016\/j.comnet.2023.110039","DOI":"10.1016\/j.comnet.2023.110039"},{"key":"462_CR11","doi-asserted-by":"publisher","unstructured":"Guan C, Ding D, Guo J (2022) Web3.0: a review and research agenda. https:\/\/doi.org\/10.1109\/rivf55975.2022.10013794","DOI":"10.1109\/rivf55975.2022.10013794"},{"key":"462_CR12","doi-asserted-by":"publisher","unstructured":"Hao J, Gao J, Xiang P, Zhang J, Chen Z, Hu H, Chen Z (2023) TDID: transparent and efficient decentralized identity management with blockchain. https:\/\/doi.org\/10.1109\/smc53992.2023.10394499","DOI":"10.1109\/smc53992.2023.10394499"},{"key":"462_CR13","doi-asserted-by":"publisher","unstructured":"Hendaoui F, Eltaief H, Youssef H (2021) Uap: a unified authentication platform for iot environment. Comput Netw 188. https:\/\/doi.org\/10.1016\/j.comnet.2021.107811","DOI":"10.1016\/j.comnet.2021.107811"},{"issue":"5","key":"462_CR14","doi-asserted-by":"publisher","first-page":"5597","DOI":"10.1109\/tnsm.2024.3433414","volume":"21","author":"X Hu","year":"2024","unstructured":"Hu X, Ling Y, Hua J, Dong Z, Sun Y, Qi J (2024) A blockchain cross-chain transaction method based on decentralized dynamic reputation value assessment. IEEE Trans Netw Serv Manage 21(5):5597\u20135612. https:\/\/doi.org\/10.1109\/tnsm.2024.3433414","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"6","key":"462_CR15","doi-asserted-by":"publisher","first-page":"4881","DOI":"10.1109\/tdsc.2023.3235951","volume":"20","author":"S Huh","year":"2023","unstructured":"Huh S, Shim M, Lee J, Woo SS, Kim H, Lee H (2023) Did we miss anything?: Towards privacy-preserving decentralized id architecture. IEEE Trans Dependable Secure Comput 20(6):4881\u20134898. https:\/\/doi.org\/10.1109\/tdsc.2023.3235951","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"462_CR16","doi-asserted-by":"publisher","unstructured":"Komlo C, Goldberg I: Frost: flexible round-optimized schnorr threshold signatures. In: 27th international conference on Selected Areas in Cryptography (SAC). Lecture Notes in Computer Science, vol 12804. (2021), pp 34\u201365. https:\/\/doi.org\/10.1007\/978-3-030-81652-0_2 . Komlo, Chelsea Goldberg, Ian 0302-9743","DOI":"10.1007\/978-3-030-81652-0_2"},{"issue":"10","key":"462_CR17","doi-asserted-by":"publisher","first-page":"8599","DOI":"10.1016\/j.jksuci.2021.09.004","volume":"34","author":"R Kumar","year":"2022","unstructured":"Kumar R, Sharma R (2022) Leveraging blockchain for ensuring trust in iot: a survey. J King Saud Univ Comput Inf Sci 34(10):8599\u20138622. https:\/\/doi.org\/10.1016\/j.jksuci.2021.09.004","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"5","key":"462_CR18","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/tpds.2020.3042392","volume":"32","author":"W Li","year":"2021","unstructured":"Li W, Feng C, Zhang L, Xu H, Cao B, Imran MA (2021) A scalable multi-layer pbft consensus for blockchain. IEEE Trans Parallel Distrib Syst 32(5):1146\u20131160. https:\/\/doi.org\/10.1109\/tpds.2020.3042392","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"462_CR19","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/mwc.018.2200568","volume":"31","author":"Y Lin","year":"2024","unstructured":"Lin Y, Gao Z, Du H, Niyato D, Kang J, Deng R, Shen XS (2024) A unified blockchain-semantic framework for wireless edge intelligence enabled web 3.0. IEEE Wirel Commun 31(2):126\u2013133. https:\/\/doi.org\/10.1109\/mwc.018.2200568","journal-title":"IEEE Wirel Commun"},{"issue":"5","key":"462_CR20","doi-asserted-by":"publisher","first-page":"2965","DOI":"10.1109\/tdsc.2021.3079315","volume":"19","author":"Z Liu","year":"2022","unstructured":"Liu Z, Xiang Y, Shi J, Gao P, Wang H, Xiao X, Wen B, Li Q, Hu Y-C (2022) Make web3.0 connected. IEEE Trans Depend Secure Comput 19(5):2965\u20132981. https:\/\/doi.org\/10.1109\/tdsc.2021.3079315","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"15","key":"462_CR21","doi-asserted-by":"publisher","first-page":"25694","DOI":"10.1109\/jiot.2024.3380068","volume":"11","author":"Y Liu","year":"2024","unstructured":"Liu Y, Zhao B, Zhao Z, Liu J, Lin X, Wu Q, Susilo W (2024) Ss-did: a secure and scalable web3 decentralized identity utilizing multilayer sharding blockchain. IEEE Internet Things J 11(15):25694\u201325705. https:\/\/doi.org\/10.1109\/jiot.2024.3380068","journal-title":"IEEE Internet Things J"},{"key":"462_CR22","doi-asserted-by":"publisher","unstructured":"Maram D, Malvai H, Zhang F, Jean-Louis N, Frolov A, Kell T, Lobban T, Moy C, Juels A, Miller A (2021) CanDID: Can-Do decentralized identity with legacy compatibility, sybil-resistance, and accountability. https:\/\/doi.org\/10.1109\/sp40001.2021.00038","DOI":"10.1109\/sp40001.2021.00038"},{"key":"462_CR23","unstructured":"Microsoft (2024) Microsoft entra verified ID. https:\/\/www.microsoft.com\/en-my\/security\/business\/identity-access\/microsoft-entra-verified-id"},{"key":"462_CR24","doi-asserted-by":"publisher","unstructured":"Peng Z, Deng J, Gao S, Cui H, Xiao B (2024) vDID: blockchain-enabled verifiable decentralized identity management for web 3.0. https:\/\/doi.org\/10.1109\/IWQoS61813.2024.10682610","DOI":"10.1109\/IWQoS61813.2024.10682610"},{"key":"462_CR25","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.iotcps.2023.05.003","volume":"3","author":"PP Ray","year":"2023","unstructured":"Ray PP (2023) Web3: a comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions. Internet Things Cyber-Phys Syst 3:213\u2013248. https:\/\/doi.org\/10.1016\/j.iotcps.2023.05.003","journal-title":"Internet Things Cyber-Phys Syst"},{"key":"462_CR26","doi-asserted-by":"publisher","unstructured":"Schlatt V, Sedlmeir J, Feulner S, Urbach N (2022) Designing a framework for digital kyc processes built on blockchain-based self-sovereign identity. Inf Manag 59(7). https:\/\/doi.org\/10.1016\/j.im.2021.103553","DOI":"10.1016\/j.im.2021.103553"},{"key":"462_CR27","doi-asserted-by":"publisher","unstructured":"Tseng C-H, Hsieh Y-H, Chen W-Q, Yuan S-M (2025) Blockchain-based labor dispatch system. J King Saud Univ Comput Inf Sci 37(6). https:\/\/doi.org\/10.1007\/s44443-025-00161-9","DOI":"10.1007\/s44443-025-00161-9"},{"key":"462_CR28","unstructured":"Veramo (2024) Veramo: decentralized identity framework. https:\/\/veramo.io\/"},{"key":"462_CR29","doi-asserted-by":"publisher","unstructured":"Vinther Daugaard T, Bisgaard Jensen J, Kauffman RJ, Kim K (2024) Blockchain solutions with consensus algorithms and immediate finality: toward panopticon-style monitoring to enhance anti-money laundering. Elect Commer Res Appl 65. https:\/\/doi.org\/10.1016\/j.elerap.2024.101386","DOI":"10.1016\/j.elerap.2024.101386"},{"key":"462_CR30","unstructured":"W3C (2022a) Decentralized Identifiers (DIDs) v1.0: core architecture, data model, and representations. W3C. (W3C). https:\/\/www.w3.org\/TR\/did-core\/"},{"key":"462_CR31","unstructured":"W3C (2022b) Verifiable credentials data model. https:\/\/www.w3.org\/TR\/vc-data-model\/"},{"key":"462_CR32","unstructured":"WeBankBlockchain (2023) WeIdentity: adecentralized identity solution. https:\/\/github.com\/WeBankBlockchain\/WeIdentity"},{"key":"462_CR33","doi-asserted-by":"publisher","unstructured":"Windley PJ (2021) Sovrin: an identity metasystem for self-sovereign identity. Front Blockchain 4. https:\/\/doi.org\/10.3389\/fbloc.2021.626726","DOI":"10.3389\/fbloc.2021.626726"},{"key":"462_CR34","doi-asserted-by":"publisher","unstructured":"Wu Y, Xiong H, Khan F, Ijaz S, Alturki R, Aljohani A (2025) Efficient and provably secured puncturable attribute-based signature for web 3.0. Futur Gen Comput Syst 164. https:\/\/doi.org\/10.1016\/j.future.2024.107568","DOI":"10.1016\/j.future.2024.107568"},{"key":"462_CR35","doi-asserted-by":"publisher","unstructured":"Xiao J, Luo T, Li C, Zhou J, Li Z (2024) Ce-pbft: a high availability consensus algorithm for large-scale consortium blockchain. J King Saud Univ Comput Inf Sci 36(2). https:\/\/doi.org\/10.1016\/j.jksuci.2024.101957","DOI":"10.1016\/j.jksuci.2024.101957"},{"issue":"24","key":"462_CR36","doi-asserted-by":"publisher","first-page":"22581","DOI":"10.1109\/jiot.2023.3303922","volume":"10","author":"R Xiong","year":"2023","unstructured":"Xiong R, Ren W, Hao X, He J, Choo K-KR (2023) Bdim: a blockchain-based decentralized identity management scheme for large scale internet of things. IEEE Internet Things J 10(24):22581\u201322590. https:\/\/doi.org\/10.1109\/jiot.2023.3303922","journal-title":"IEEE Internet Things J"},{"key":"462_CR37","doi-asserted-by":"publisher","unstructured":"Xiong R, Cheng J, Pu J, Dong X, Chen C, Xu Z (2025) Enhancing trust and collaboration: a reputation-driven mechanism for cross-chain iot data sharing. Comput Netw 264. https:\/\/doi.org\/10.1016\/j.comnet.2025.111266","DOI":"10.1016\/j.comnet.2025.111266"},{"issue":"1","key":"462_CR38","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/mnet.2023.10110018","volume":"37","author":"S Yang","year":"2023","unstructured":"Yang S, Li MX (2023) Web3.0 data infrastructure: challenges and opportunities. Ieee Network 37(1):4\u20135. https:\/\/doi.org\/10.1109\/mnet.2023.10110018","journal-title":"Ieee Network"},{"key":"462_CR39","doi-asserted-by":"publisher","unstructured":"Yang H, Song R, Chen B, Song Y, Xiao B (2024) MoDID: decentralized identity management for multiple owners. https:\/\/doi.org\/10.1109\/icc51166.2024.10622445","DOI":"10.1109\/icc51166.2024.10622445"},{"issue":"8","key":"462_CR40","doi-asserted-by":"publisher","first-page":"6718","DOI":"10.1109\/jiot.2022.3145089","volume":"10","author":"J Yin","year":"2023","unstructured":"Yin J, Xiao Y, Pei Q, Ju Y, Liu L, Xiao M, Wu C (2023) Smartdid: a novel privacy-preserving identity based on blockchain for iot. IEEE Internet Things J 10(8):6718\u20136732. https:\/\/doi.org\/10.1109\/jiot.2022.3145089","journal-title":"IEEE Internet Things J"},{"key":"462_CR41","doi-asserted-by":"publisher","unstructured":"Zhu J, Li F, Chen J (2024) A survey of blockchain, artificial intelligence, and edge computing for web 3.0. Comput Sci Rev 54. https:\/\/doi.org\/10.1016\/j.cosrev.2024.100667","DOI":"10.1016\/j.cosrev.2024.100667"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00462-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00462-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00462-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:39:31Z","timestamp":1773153571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00462-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["462"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00462-z","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,14]]},"assertion":[{"value":"12 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Declaration"}}],"article-number":"65"}}