{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:21:28Z","timestamp":1769149288803,"version":"3.49.0"},"reference-count":57,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T00:00:00Z","timestamp":1578700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100009543","name":"Pontificia Universidad Javeriana","doi-asserted-by":"publisher","award":["3318"],"award-info":[{"award-number":["3318"]}],"id":[{"id":"10.13039\/501100009543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This paper proposes an architecture for biometric electronic identification document (e-ID) system based on Blockchain for citizens identity verification in transactions corresponding to the notary, registration, tax declaration and payment, basic health services and registration of economic activities, among others. To validate the user authentication, a biometric e-ID system is used to avoid spoofing and related attacks. Also, to validate the document a digital certificate is used with the corresponding public and private key for each citizen by using a user\u2019s PIN. The proposed transaction validation process was implemented on a Blockchain system in order to record and verify the transactions made by all citizens registered in the electoral census, which guarantees security, integrity, scalability, traceability, and no-ambiguity. Additionally, a Blockchain network architecture is presented in a distributed and decentralized way including all the nodes of the network, database and government entities such as national register and notary offices. The results of the application of a new consensus algorithm to our Blockchain network are also presented showing mining time, memory and CPU usage when the number of transactions scales up.<\/jats:p>","DOI":"10.3390\/fi12010010","type":"journal-article","created":{"date-parts":[[2020,1,13]],"date-time":"2020-01-13T04:05:51Z","timestamp":1578888351000},"page":"10","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["An Architecture for Biometric Electronic Identification Document System Based on Blockchain \u2020"],"prefix":"10.3390","volume":"12","author":[{"given":"Rafael","family":"P\u00e1ez","sequence":"first","affiliation":[{"name":"Department of Computer Science Engineering, Pontificia Universidad Javeriana, Bogot\u00e1 D.C. 110231, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6753-6318","authenticated-orcid":false,"given":"Manuel","family":"P\u00e9rez","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Pontificia Universidad Javeriana, Bogot\u00e1 D.C. 110231, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8607-593X","authenticated-orcid":false,"given":"Gustavo","family":"Ram\u00edrez","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Pontificia Universidad Javeriana, Bogot\u00e1 D.C. 110231, Colombia"}]},{"given":"Juan","family":"Montes","sequence":"additional","affiliation":[{"name":"Department of Electronics Engineering, Pontificia Universidad Javeriana, Bogot\u00e1 D.C. 110231, Colombia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8806-6482","authenticated-orcid":false,"given":"Lucas","family":"Bouvarel","sequence":"additional","affiliation":[{"name":"Department of Computer Science Engineering, Pontificia Universidad Javeriana, Bogot\u00e1 D.C. 110231, Colombia"}]}],"member":"1968","published-online":{"date-parts":[[2020,1,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Supriyanto, A., and Mustofa, K. (2016, January 26\u201327). E-gov readiness assessment to determine E-government maturity phase. Proceedings of the 2016 2nd International Conference on Science in Information Technology, ICSITech 2016: Information Science for Green Society and Environment, Balikpapan, Indonesia.","DOI":"10.1109\/ICSITech.2016.7852646"},{"key":"ref_2","unstructured":"(2019, September 18). Registraduria Nacional del Estado Civil, Available online: https:\/\/www.registraduria.gov.co\/."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ansari, A.Q. (2011, January 3\u20135). E-Document retrieval using rough-set theory. Proceedings of the ICIIP 2011 International Conference on Image Information Processing, Shimla, India.","DOI":"10.1109\/ICIIP.2011.6108907"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MSP.2011.148","article-title":"Electronic Identity Cards for User Authentication\u2014Promise and Practice","volume":"10","author":"Waldmann","year":"2012","journal-title":"IEEE Secur. Priv."},{"key":"ref_5","unstructured":"(2019, September 18). Policia Nacional de Colombia, Available online: https:\/\/www.policia.gov.co\/."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Haque, M.A., Khan, N.Z., and Khatoon, G. (2015, January 20\u201322). Authentication through keystrokes: What you type and how you type. Proceedings of the 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks, ICRCICN, Kolkata, India.","DOI":"10.1109\/ICRCICN.2015.7434246"},{"key":"ref_7","unstructured":"Nakamoto, S. (2020, January 10). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","article-title":"Blockchains and Smart Contracts for the Internet of Things","volume":"4","author":"Christidis","year":"2016","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Bocek, T., Rodrigues, B.B., Strasser, T., and Stiller, B. (2017, January 8\u201312). Blockchains everywhere\u2014A use-case of blockchains in the pharma supply-chain. Proceedings of the IM 2017\u20142017 IFIP\/IEEE International Symposium on Integrated Network and Service Management, Lisbon, Portugal.","DOI":"10.23919\/INM.2017.7987376"},{"key":"ref_10","unstructured":"Li, X., Jiang, P., Chen, T., Luo, X., and Wen, Q. (2017). A survey on the security of blockchain systems. Future Gener. Comput. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017, January 25\u201330). An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. Proceedings of the 2017 IEEE 6th International Congress on Big Data, (BigData Congress), Honolulu, HI, USA.","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref_12","unstructured":"Solat, S., and Potop-butucaru, M. (2016). ZeroBlock: Preventing Selfish Mining in Bitcoin. [Ph.D. Thesis, Sorbonne Universites]."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Eyal, I., and Sirer, E.G. (2014, January 3\u20137). Majority is not Enough: Bitcoin Mining is Vulnerable. Proceedings of the 18th International Conference on Financial Cryptography and Data Security, Barbados, Federation of the West Indies.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhao, X., Chen, Z., Chen, X., Wang, Y., and Tang, C. (2017, January 11\u201313). The DAO attack paradoxes in propositional logic. Proceedings of the 4th International Conference on Systems and Informatics, ICSAI 2017, Hangzhou, China.","DOI":"10.1109\/ICSAI.2017.8248566"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Zohar, A., and Vanbever, L. (2017, January 22\u201326). Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA.","DOI":"10.1109\/SP.2017.29"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Singh, A., Ngan, T.W., Druschel, P., and Wallach, D.S. (2006, January 23\u201329). Eclipse attacks on overlay networks: Threats and defenses. Proceedings of the IEEE INFOCOM, Barcelona, Spain.","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"ref_17","unstructured":"Heilman, E., Kendler, A., Zohar, A., and Goldberg, S. (2015, January 12\u201314). Eclipse Attacks on Bitcoin\u2019s Peer-to-Peer Network. Proceedings of the USENIX Security Symposium, Washington, DC, USA."},{"key":"ref_18","unstructured":"Aggelos Kiayias, G.P. (2017, January 20\u201322). On Trees, Chains and Fast Transactions in the Blockchain. Proceedings of the International Conference on Cryptology and Information Security in Latin America, Havana, Cuba."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Natoli, C., and Gramoli, V. (2017, January 26\u201329). The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium. Proceedings of the 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA.","DOI":"10.1109\/DSN.2017.44"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Saia, R. (2018). Internet of Entities (IoE): A Blockchain-based Distributed Paradigm to Security. arXiv.","DOI":"10.5220\/0007379600770084"},{"key":"ref_21","first-page":"169","article-title":"Blockchain and biometrics: A first look into opportunities and challenges","volume":"1010","author":"Fierrez","year":"2019","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_22","first-page":"216","article-title":"E-Residency: A business platform for Industry 4.0?","volume":"3","author":"Prause","year":"2016","journal-title":"Entrep. Sustain. Issues"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S0969-4765(18)30067-5","article-title":"Biometrics on the blockchain","volume":"2018","author":"Garcia","year":"2018","journal-title":"Biom. Technol. Today"},{"key":"ref_24","unstructured":"Ministerio del Interior Espa\u00f1a (2020, January 10). Gu\u00eda De Refernecia Del DNIE Con NFC. Available online: https:\/\/www.dnielectronico.es\/PDFs\/Guia_de_Referencia_DNIe_con_NFC.pdf."},{"key":"ref_25","first-page":"371","article-title":"Methods and applications of optical holography","volume":"17","year":"2011","journal-title":"Mater. Sci."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/JDT.2014.2367528","article-title":"Digital hologram authentication using a hadamard-based reversible fragile watermarking algorithm","volume":"11","author":"Chan","year":"2015","journal-title":"IEEE\/OSA J. Disp. Technol."},{"key":"ref_27","unstructured":"Hanchez, D. (2003). A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. [Ph.D. Thesis, Univesit\u00e9 Chatolique de Louvain]."},{"key":"ref_28","unstructured":"Duncan, R. (2020, January 10). An Overview of Different Authentication Methods. Available online: https:\/\/www.sans.org\/reading-room\/whitepapers\/authentication\/overview-authentication-methods-protocols-118."},{"key":"ref_29","unstructured":"Nagel, R.H. (2006). System and Method for Production and Authentication of Original Documents. (7080041), U.S. Patent."},{"key":"ref_30","unstructured":"Hoang, B., and Caudill, A. (2012). Biometrics, IEEE. Technical Report."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/6294.899930","article-title":"Practical guide to biometric security technology","volume":"3","author":"Liu","year":"2001","journal-title":"IT Prof."},{"key":"ref_32","unstructured":"National Science and Technology Council (2020, January 10). Biometrics in Goverment POST-9\/11\u2014Advancing Science, Enhancing Operations. Available online: https:\/\/fas.org\/irp\/eprint\/biometrics.pdf."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MC.2010.38","article-title":"Fingerprint matching","volume":"43","author":"Jain","year":"2010","journal-title":"Computer"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Moi, S.H., Rahim, N.B.A., Saad, P., Sim, P.L., Zakaria, Z., and Ibrahim, S. (2009, January 4\u20137). Iris biometric cryptography for identity document. Proceedings of the SoCPaR 2009\u2014Soft Computing and Pattern Recognition, Malacca, Malaysia.","DOI":"10.1109\/SoCPaR.2009.149"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Wayman, J., Jain, A., Maltoni, D., and Maio, D. (2005). Biometric Systems\u2014Technology, Design and Performance Evaluation, Springer.","DOI":"10.1007\/b138151"},{"key":"ref_36","first-page":"479","article-title":"Rainbow Table Optimization for Password Recovery","volume":"4","author":"Thing","year":"2011","journal-title":"Int. J. Adv. Softw."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Vaidya, S.A., and Bhosale, V. (2016, January 26\u201327). Invisible touch screen based PIN authentication to prevent shoulder surfing. Proceedings of the 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India.","DOI":"10.1109\/INVENTIVE.2016.7824808"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Mart\u00edn-Fern\u00e1ndez, F., Caballero-Gil, P., and Caballero-Gil, C. (2016). Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things. Sensors, 16.","DOI":"10.3390\/s16010075"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Fisher, R., Lyu, M., Cheng, B., and Hancke, G. (2016, January 14\u201317). Public key cryptography: Feasible for security in modern personal area sensor networks?. Proceedings of the IEEE International Conference on Industrial Technology Taipei, Taiwan.","DOI":"10.1109\/ICIT.2016.7475078"},{"key":"ref_40","unstructured":"Murrell, S., and Einspruch, N.G. (July, January 30). Electronic identification, personal privacy and security in the services sector. Proceedings of the 5th International Conference Service Systems and Service Management\u2014Exploring Service Dynamics with Science and Innovative Technology, ICSSSM\u201908, Melbourne, VIC, Australia."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2106","DOI":"10.1109\/TWC.2012.032812.110433","article-title":"PKC based broadcast authentication using signature amortization for WSNs","volume":"11","author":"Liu","year":"2012","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Yaakob, W.F.H., Manab, H.H., and Adzmi, S.N.M. (2014, January 7\u201310). Smart card chip design implementation on ARM processor-based FPGA. Proceedings of the 2014 IEEE 3rd Global Conference on Consumer Electronics, GCCE, Tokyo, Japan.","DOI":"10.1109\/GCCE.2014.7031183"},{"key":"ref_43","first-page":"27","article-title":"A Critical Look of USSD Technology Adoption and Benefits","volume":"5","author":"Sigar","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Siyang, Z. (2015, January 13\u201314). Deformed Two-Dimension Code Quick Recognition Algorithm Design and Implementation in Uncertain Environment. Proceedings of the 2015 7th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2015, Nanchang, China.","DOI":"10.1109\/ICMTMA.2015.83"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Leithner, M., Kieseberg, P., Schrittwieser, S., Munroe, L., Mulazzani, M., Sinha, M., and Weippl, E. (2010, January 8\u201310). QR code security. Proceedings of the MoMM\u20192010\u2014The Eighth International Conference on Advances in Mobile Computing and Multimedia, Paris, France.","DOI":"10.1145\/1971519.1971593"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2005.12.003","article-title":"Radio frequency identification (RFID)","volume":"25","author":"Roberts","year":"2006","journal-title":"Comput. Secur."},{"key":"ref_47","unstructured":"Sarma, S.E., Weis, S.A., and Engels, D.W. (2002, January 13\u201315). RFID Systems and Security and Privacy Implications. Proceedings of the Cryptographic Hardware and Embedded Systems, Redwood Shores, CA, USA."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"192","DOI":"10.3182\/20100701-2-PT-4011.00034","article-title":"Analysis of different techniques to define metadata structure in NFC\/RFID cards to reduce access latency, optimize capacity, and guarantee integrity","volume":"10","author":"Jara","year":"2010","journal-title":"IFAC Proc. Vol."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Shobha, N.S.S., Aruna, K.S.P., Bhagyashree, M.D.P., and Sarita, K.S.J. (2016, January 18\u201319). NFC and NFC payments: A review. Proceedings of the 2016 International Conference on ICT in Business, Industry, and Government, ICTBIG, Indore, India.","DOI":"10.1109\/ICTBIG.2016.7892683"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"160","DOI":"10.7763\/IJMO.2018.V8.642","article-title":"A Model for National Electronic Identity Document and Authentication Mechanism Based on Blockchain","volume":"8","author":"Juan","year":"2018","journal-title":"Int. J. Model. Optim."},{"key":"ref_51","first-page":"101","article-title":"A survey about consensus algorithms used in Blockchain","volume":"14","author":"Kyungbaek","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref_52","unstructured":"Ittay Eyal, E.G.S. (2019, September 18). How to Disincentivize Large Bitcoin Mining Pools. Available online: http:\/\/hackingdistributed.com\/2014\/06\/18\/how-to-disincentivize-large-bitcoin-mining-pools\/."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Miller, A., Kosba, A., Katz, J., and Shi, E. (2015, January 12\u201316). Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. Proceedings of the ACM Conference on Computer and Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813621"},{"key":"ref_54","unstructured":"King, S., and Nadal, S. (2020, January 10). PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Available online: https:\/\/bitcoin.peryaudo.org\/vendor\/peercoin-paper.pdf."},{"key":"ref_55","unstructured":"Vasin, P. (2020, January 10). BlackCoin\u2019s Proof-of-Stake Protocol v2 Pavel. Available online: https:\/\/blackcoin.org\/blackcoin-pos-protocol-v2-whitepaper.pdf."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Bentov, I., Gabizon, A., and Mizrahi, A. (2016, January 22\u201326). Cryptocurrencies without proof of work. Proceedings of the International Conference on Financial Cryptography and Data Security, Barbados, Federation of the West Indies.","DOI":"10.1007\/978-3-662-53357-4_10"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Milutinovic, M., He, W., Wu, H., and Kanwal, M. (2016, January 12\u201316). Proof of Luck: An efficient blockchain consensus protocol. Proceedings of the SysTEX 2016\u20141st Workshop on System Software for Trusted Execution, Colocated with ACM\/IFIP\/USENIX Middleware 2016, Trento, Italy.","DOI":"10.1145\/3007788.3007790"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/1\/10\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:04:28Z","timestamp":1760364268000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/1\/10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,11]]},"references-count":57,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["fi12010010"],"URL":"https:\/\/doi.org\/10.3390\/fi12010010","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,11]]}}}