A critical review of blockchain-based authentication techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.4.17Keywords:
Blockchain technology, Authentication mechanisms, Digital security, Decentralized identity, Scalability, Privacy complianceDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Technology is very agile when it comes to securing data integrity, privacy and identity generally, and by extension, technology is very fit for use in the authentication of users and as a device. The focus of this paper lies in an attempt to find alternatives to the authentication in the blockchain, which is based on tokens, biometrics or knowledge. Further, the paper reviews the use of public, private and consortium blockchain in the field of healthcare, IoT, and cloud services. In this review, I will be looking at how strong blockchain-based authentication is compared with the old-school centralized authentication. It covers the advantages to security of decentralizing, but also practical limitations. Next, the challenges of scaling, spending energy, and compliance with legal regulations of blockchain in secure authentication are elaborated and the ways of improvement for blockchain in secure authentication are suggested. It provides a descriptive analysis of blockchain technologies that were recently published and a case study to compare and contrast different blockchain technologies and their usage in authenticating. This is not a systematic review as it does not discuss concepts from one perspective but rather discusses a handful of studies that contain peer-reviewed sources and evaluates the conceptual models and then accordingly assesses their performance in the real world. It offers the advantage of using different blockchain-based authentication instead of centralized systems. It eliminates single points of failure, has light tamper-proof reach back audit trials and controls personal data. The technology itself is still not close to solving those issues, which makes things too costly and too energy consuming, unable to scale and there is little point in the framework of legs. To broaden adoption for future systems, they must be more lightweight and more efficient in consensus protocols and further aligned with regulation.Abstract
How to Cite
Downloads
Similar Articles
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing security of cloud using static IP techniques , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- R. Rita Jenifer, V. Sinthu Janita, Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- M. Ragul, A. Aloysius, V. Arul Kumar, Enhancing IoT blockchain scalability through the eepos consensus algorithm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- I.Bhuvaneshwarri, M. N. Sudha, An implementation of secure storage using blockchain technology on cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- K. Sreenivasulu, Sampath S, Arepalli Gopi, Deepak Kartikey, S. Bharathidasan, Neelam Labhade Kumar, Advancing device and network security for enhanced privacy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Manpreet Kaur, Shweta Mishra, A smart grid data privacy-preserving aggregation approach with authentication , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- N. Ruba, A. S. A. Khadir, Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.

