Jia Xian, Lin You, Qifei Yi, Jixiang Wang, Gengran Hu
{"title":"A survey on decentralized identity management systems","authors":"Jia Xian, Lin You, Qifei Yi, Jixiang Wang, Gengran Hu","doi":"10.1016/j.cosrev.2025.100811","DOIUrl":null,"url":null,"abstract":"<div><div>Digital identity is a crucial tool in the field such as healthcare, education and government. It serves as the foundation for establishing presence in cyberspace. With the increasing demands for security, control and portability, digital identity has evolved through four stages: centralized, federated, user-centric and self-sovereign identity. Among these, the decentralized identity represents the self-sovereign identity stage, emphasizing the idea of the user fully control over the user’s identity. Blockchain, as the key technology enabling decentralization, provides robust support for the decentralized identity through its transparent, distributed and immutable characteristics. We investigate the blockchain-based Decentralized Identity Management Systems (DIDMS), analyzing their advantages over the previous systems in terms of the enhanced control, privacy, and security. We propose a four-phase architecture for the DIDMS, detailing how the users can achieve self-management through the DIDMS without relying on the centralized entities. Furthermore, this investigation compares the various solutions with the core practical properties, explores the relationships between these features, and summarizes the evaluation criteria for the DIDMS. Additionally, the work evaluates both classical and cutting-edge DIDMS solutions and discusses the challenges faced by the DIDMS, along with potential solutions, providing direction for future research and practice.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"58 ","pages":"Article 100811"},"PeriodicalIF":12.7000,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000875","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Digital identity is a crucial tool in the field such as healthcare, education and government. It serves as the foundation for establishing presence in cyberspace. With the increasing demands for security, control and portability, digital identity has evolved through four stages: centralized, federated, user-centric and self-sovereign identity. Among these, the decentralized identity represents the self-sovereign identity stage, emphasizing the idea of the user fully control over the user’s identity. Blockchain, as the key technology enabling decentralization, provides robust support for the decentralized identity through its transparent, distributed and immutable characteristics. We investigate the blockchain-based Decentralized Identity Management Systems (DIDMS), analyzing their advantages over the previous systems in terms of the enhanced control, privacy, and security. We propose a four-phase architecture for the DIDMS, detailing how the users can achieve self-management through the DIDMS without relying on the centralized entities. Furthermore, this investigation compares the various solutions with the core practical properties, explores the relationships between these features, and summarizes the evaluation criteria for the DIDMS. Additionally, the work evaluates both classical and cutting-edge DIDMS solutions and discusses the challenges faced by the DIDMS, along with potential solutions, providing direction for future research and practice.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.