A critical review of blockchain-based authentication techniques
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.4.17Keywords:
Blockchain technology, Authentication mechanisms, Digital security, Decentralized identity, Scalability, Privacy complianceDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Technology is very agile when it comes to securing data integrity, privacy and identity generally, and by extension, technology is very fit for use in the authentication of users and as a device. The focus of this paper lies in an attempt to find alternatives to the authentication in the blockchain, which is based on tokens, biometrics or knowledge. Further, the paper reviews the use of public, private and consortium blockchain in the field of healthcare, IoT, and cloud services. In this review, I will be looking at how strong blockchain-based authentication is compared with the old-school centralized authentication. It covers the advantages to security of decentralizing, but also practical limitations. Next, the challenges of scaling, spending energy, and compliance with legal regulations of blockchain in secure authentication are elaborated and the ways of improvement for blockchain in secure authentication are suggested. It provides a descriptive analysis of blockchain technologies that were recently published and a case study to compare and contrast different blockchain technologies and their usage in authenticating. This is not a systematic review as it does not discuss concepts from one perspective but rather discusses a handful of studies that contain peer-reviewed sources and evaluates the conceptual models and then accordingly assesses their performance in the real world. It offers the advantage of using different blockchain-based authentication instead of centralized systems. It eliminates single points of failure, has light tamper-proof reach back audit trials and controls personal data. The technology itself is still not close to solving those issues, which makes things too costly and too energy consuming, unable to scale and there is little point in the framework of legs. To broaden adoption for future systems, they must be more lightweight and more efficient in consensus protocols and further aligned with regulation.Abstract
How to Cite
Downloads
Similar Articles
- Megha Joshi, Bhaskar Pandya, Feminist Narratology and Gendered Reimagining of the Mahabharata in Kane’s work Karna’s Wife: The Outcast’s Queen , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Subhasre S, Nirmala Varghese, A study on consumer attitude and preferences towards graphic design on clothing , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Kirti Gupta, Parul Goyal, Modified-multi objective firefly optimization algorithm for object oriented applications test suites optimization , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Rianka Sarkar, P. Sreeramulu, Oceanic Epistemologies and Trans-corporeality: Reimagining Amitav Ghosh through Anthropocene Narratives , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Nitin J. Wange, Sachin V. Chaudhari, Koteswararao Seelam, S. Koteswari, T. Ravichandran, Balamurugan Manivannan, Algorithmic material selection for wearable medical devices a genetic algorithm-based framework with multiscale modeling , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Amanda Q. Okronipa, Jones Y. Nyame, Exploring the effect of perceived empathy and social presence on the intention to use AI in higher education , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sadhana Gaikwad, Rajvardhan, Overview on biased news reporting of Indian television with legal aspect , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Deepa S, Sripriya T, Radhika M, Jeneetha J. J, Experimental evaluation of artificial intelligence assisted heart disease prediction using deep learning principle , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Mohiyuddeen Hafzal, Management strategies for sustainable development goals: A roadmap to Viksit Bharat@2047 , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
<< < 16 17 18 19 20 21 22 23 24 25 > >>
You may also start an advanced similarity search for this article.

