Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2025 Dec 28;16:3660. doi: 10.1038/s41598-025-33685-1

DA34FL: a robust dynamic accumulator-based authentication and key agreement with preserving model training data integrity for federated learning

Songtao Li 1, Yixuan Zhang 1, Jie Bai 2, Kuan Fan 2,
PMCID: PMC12847921  PMID: 41457192

Abstract

Federated Learning (FL) offers a privacy-preserving distributed learning paradigm by enabling model training without direct access to raw data. However, FL remains vulnerable to unauthorized access during training and client-server exchanges. Authentication and key agreement are essential to restrict access to legitimate participants. Existing FL authentication schemes are prone to impersonation risks, centralized PKI fragility, and insufficient integrity guarantees. To address these challenges, we propose DAInline graphic4FL, a robust dynamic accumulator-based authentication and key agreement with preserving data integrity for FL. Specifically, our proposed DAInline graphic4FL is an efficient authentication protocol utilizing dynamic accumulators, blockchain technology, and message authentication codes, which ensures robust member management, authorized access, and data integrity. Security analysis against the eCK adversary model confirms the resilience of our protocol. Furthermore, experiments and performance evaluations show the effectiveness of our method, with computational overhead competitive with current state-of-the-art (SOTA) baselines.

Keywords: Federated learning, Authentication and key agreement, eCK adversary, Dynamic accumulator, Blockchain

Subject terms: Engineering, Mathematics and computing

Introduction

Federated Learning (FL) has emerged as a promising machine learning paradigm for distributed model training, preserving the privacy of local raw data13. Despite its inherent privacy advantages, FL remains susceptible to unauthorized access during transmission phases4, posing significant risks of privacy compromise. Essential security measures include mutual authentication to prevent unauthorized access, session key secrecy to safeguard data transmission, and integrity verification to detect model tampering5. Among these measures, Authentication and Key Agreement (AKA) plays a crucial role in FL, as it not only verifies the legitimacy of participating entities but also ensures secure and trusted communication. Without effective AKA mechanisms, FL systems are vulnerable to various attacks such as impersonation, man-in-the-middle, and data leakage, which can severely undermine the privacy and integrity of the learning process. Therefore, the design of robust AKA schemes is essential to establish a secure communication environment in FL.

The standard AKA workflow in FL is depicted in Fig. 1, involving three principal entities: client devices (participants), a central server (coordinator), and a trusted authority (commonly a Key Generation Center, KGC). Specifically, client devices and the server perform mutual authentication through the mediation or assistance of the KGC, followed by the establishment of a session key for secure communication. This session key is subsequently used to encrypt model updates and other sensitive information during the training process, ensuring data confidentiality and integrity against external threats. However, this conventional AKA framework faces two fundamental challenges considering security and performance perspectives.

Fig. 1.

Fig. 1

Typical AKA framework in FL.

Challenge 1: Security weakness: most existing authentication protocols rely on a centralized Public Key Infrastructure (PKI) framework68. Should the KGC be compromised or experience downtime, the entire FL system becomes vulnerable. Huang et al.’s protocol for secure data transmission in FL, while innovative, remains susceptible to this centralization issue and impersonation attacks by legitimate users9. On the other side, Fan et al.’s DAFL framework attempts to address decentralization in FL but lacks adequate key agreement functionality, compromising data security10. Additionally, current AKA solutions do not ensure the integrity of transmitted training data, potentially leading to failures in the FL process11.

Challenge 2: Inefficient dynamic membership management: existing solutions face performance challenges from inefficient member management mechanisms. The substantial computational overhead required for authentication and key agreement impedes the model training process12,13, particularly when frequent member additions or removals occur. Current AKA protocols typically require complete reconstruction of membership credentials during dynamic updates, which is especially problematic in FL where participant turnover is common14. While some decentralized approaches have been proposed15, they often incur significant computational and storage overhead due to frequent updates, failing to provide an optimal balance between security and efficiency.

To address above-mentioned challenges, we introduce DAInline graphic4FL, a robust dynamic accumulator-based authentication and key agreement with preserving data integrity for FL. DAInline graphic4FL is an efficient authentication protocol that implements four key security enhancements: (i) robust mutual authentication and decentralized trust, achieved through blockchain-secured pseudonyms, dynamic accumulators to thwart impersonation attacks16; (ii) a hybrid KGC architecture, distributing the KGC’s master secret key via Shamir’s (kn) threshold scheme and leveraging blockchain for transparent, tamper-proof state management, which mitigates centralized issues. (iii) secure session key agreement, utilizing Elliptic Curve Cryptography (ECC) resistant to key compromise within the eCK model17; and (iv) data integrity protection, ensuring the veracity of model updates via MAC-verified methods to protect the integrity of the model training data18.

Performance-wise, the dynamic accumulator provides more efficient member management than static schemes16, allowing for real-time user additions or removals without needing to reconstruct the entire member list. The use of IPFS further optimizes the system by offloading large model storage from the blockchain, reducing costs and improving scalability. Compared to state-of-the-art methods9,10,15, our protocol exhibits superior performance by achieving a robust balance between enhanced security, decentralization, and efficiency.

Beyond existing FL-AKA schemes (e.g.,9,10), DAInline graphic4FL (i) decentralizes trust via a thresholded KGC with on-chain state for verifiable recovery; (ii) supports efficient dynamic membership through a cryptographic accumulator with constant-time verification; (iii) preserves model-update integrity using lightweight MACs with IPFS off-chain storage; and (iv) enables quick session-key updates without full re-authentication, while remaining provably secure under the eCK model and competitive in cost.

The main contributions of this study are as follows:

  • Robust dynamic accumulator-based and effective AKA protocol: We introduce DAInline graphic4FL, a brand-new AKA protocol tailored for FL. The protocol ensures mutual authentication and secure encryption of model training data. It employs a dynamic accumulator for efficient member management, leverages blockchain technology for decentralization implements a robust recovery mechanism. Specifically, the KGC’s master secret key is distributed via a threshold scheme, and its state is securely backed up on-chain, enabling a new KGC to be selected and the system state to be fully restored. Additionally, the incorporation of Message Authentication Codes (MAC) guarantees the integrity of the model training data.

  • Detailed security analysis: We provide a provable security proof for the DAInline graphic4FL protocol under the eCK model, ensuring the semantic security of the session key. Subsequent heuristic analysis demonstrate the protocol’s robustness against diverse attacks and underscores its critical functionality.

  • Extensive performance analysis: We conducted extensive experiments and performed a thorough performance evaluation of DAInline graphic4FL, establishing that the protocol not only matches but frequently surpasses the performance of existing solutions. Our comparative performance analysis across five most-related authentication schemes demonstrates that DAInline graphic4FL maintains competitive computational and communication costs compared to state-of-the-art protocols.

The remainder of this study is organized as follows: section “Related works” reviews the related works. Section “Problem statement” outlines the preliminary work. Section “The proposed protocol” details the proposed authentication protocol. Sections “Security analyses of the proposed protocol” and “Experiments and performance analyses” provides a comprehensive security and performance analysis of DAInline graphic4FL. Finally, section “Conclusion and future work” concludes the paper.

Related works

This section presents a review of the literature on our topic, covering AKA protocols under centralized and decentralized architectures.

AKA under centralized architecture

The Public Key Infrastructure (PKI) employs centralized Certificate Authorities (CAs) to issue digital certificates, which are crucial for verifying the identities of entities7. This mechanism has been extensively adopted across various sectors. For instance, Siddiqui et al.19 proposed a dual-CA model to enhance security in cloud IoT systems. Similarly, Azees20 and Vijayakumar21 have developed PKI-based protocols for anonymous vehicle authentication, and Huang et al.9 have incorporated PKI into their FL scheme.

However, a significant drawback of PKI is its vulnerability due to the centralized nature of certificate issuance. A single compromised CA can jeopardize the security of the entire system. Wang et al.22 emphasize that centralized PKI systems are particularly susceptible to security breaches if the CA is compromised. Additionally, traditional authentication methods such as Kerberos and OAuth, which heavily rely on central trust servers, may efficiently authenticate users but lack the robustness required to withstand large-scale attacks23.

AKA under decentralized architecture

Some research has explored blockchain-based alternatives to address the vulnerabilities associated with centralized PKI architectures24,25. Wang et al.22 developed a blockchain-based decentralized authentication method for smart grid edge computing that enhances data security, albeit at the expense of user anonymity. Parameswarath et al.15 introduced a user-empowered authentication scheme for electric vehicle charging that leverages decentralized identity and verifiable credentials, though it incurs considerable storage and communication costs. Similarly, Fan10 proposed a decentralized scheme for FL that lacks key agreement, compromising the security of private data. In addition, the study by Wang et al.22 also addressed the dynamic addition and removal of members, but was found inefficient in managing these changes. Each time a user joins or leaves, substantial overhead is required to update cryptographic keys and verify member credentials, which is particularly costly in FL where member updates are frequent. In response, decentralized solutions have been suggested10,15, yet they still incur significant computational and storage overhead due to frequent updates22,26,27.

Moreover, in FL, the aforementioned schemes primarily ensure confidentiality but fail to guarantee data integrity. Even though the model training data is encrypted using session keys, it remains vulnerable to interception by attackers who might corrupt the data sent to trainers, potentially disrupting the training and aggregation processes11. Earlier methods like checksums, used to verify data integrity, lacked cryptographic robustness as they did not rely on a shared secret key, thus making them prone to forgery and collision attacks28. To safeguard message integrity, digital signatures have traditionally been employed to verify the integrity and authenticity of transactions10. However, digital signatures entail significant computational and storage demands. Unlike MACs, digital signatures require asymmetric cryptographic operations, which are computationally intensive and less efficient for frequent message authentication29,30. Decentralized authentication schemes often rely on digital signatures instead of MACs, adding to the computational load31. While this method ensures authenticity, it proves less efficient in resource-constrained environments like FL, where lightweight authentication mechanisms are preferred32.

Preliminaries

This section overviews the core building blocks used in DAInline graphic4FL: dynamic accumulators for efficient membership management, the eCK threat model for formal security, message authentication codes (MACs) for lightweight integrity, and Shamir’s (kn) threshold secret sharing for KGC resilience. Table 2 summarizes the notation used throughout the paper.

Table 2.

Notations of symbols in DAInline graphic4FL.

Symbols Notations Symbols Notations
KGC Key generation center Inline graphic Hash function
Inline graphic, Inline graphic ith user and jth task publisher Inline graphic, Inline graphic Public key of ith user and jth task publisher
Inline graphic, Inline graphic, Inline graphic Private key of ith user, jth task publisher and KGC Inline graphic, Inline graphic Public dynamic value of ith user and jth task publisher
Inline graphic, Inline graphic Secret dynamic value of ith user and jth task publisher Inline graphic, Inline graphic Pseudo identity of ith user and jth task publisher
Inline graphic, Inline graphic Secret value pair for Inline graphic Inline graphic, Inline graphic Secret value pair for Inline graphic
TS Time stamp Inline graphic Maximum time to discard a request
MSK Master Secret key of KGC SK Session key of ith user and jth task publisher
Inline graphic, Inline graphic Identity of ith user and jth task publisher Inline graphic Public key of KGC

Dynamic accumulator

This subsection consolidates the dynamic accumulator background used throughout the protocol. The proposed scheme utilizes an accumulator as a repository for registered entities, converting a set containing numerous identities and public key information into an accumulator value while generating a concise witness to verify that a specific element belongs to the set F33,34. Dynamic accumulators enable the committee to manage member identities without retaining all member information, thus enhancing the efficiency of the authentication scheme. Compared to schemes lacking dynamic accumulators, this scheme provides considerable advantages in computational efficiency and storage costs.

In this scheme, the dynamic accumulator comprises five functions: Inline graphic, Inline graphic, Inline graphic, Inline graphic, and Inline graphic. The witness generation function, Inline graphic, produces proof for an element Inline graphic using the accumulator value Inline graphic and the set F. The verification function, Inline graphic, assesses the validity of the witness. The addition function, Inline graphic, and the deletion function, Inline graphic, modify the set and accumulator value as elements are added or removed. Additionally, the witness update function, Inline graphic, ensures that the witness for any modified element remains valid, thereby preserving the integrity of the set’s cryptographic proof.

To justify our choice of dynamic accumulators, Table 1 compares DAInline graphic4FL’s accumulator-based approach with alternative membership data structures (Merkle trees and Bloom filters) in terms of asymptotic complexity, revocability, false positives, and message rounds required for authentication. As shown, dynamic accumulators offer constant-time operations for add, delete, and verify, support true revocability without false positives, and enable efficient three-round authentication. Merkle trees incur logarithmic overhead for updates and verification, while Bloom filters lack true deletion and introduce probabilistic false positives, making them unsuitable for security-critical AKA protocols.

Table 1.

Comparison of membership data structures for AKA.

Scheme Add Del Verify Revocable False positive Message rounds
Dynamic Accumulator Inline graphic Inline graphic Inline graphic Yes No 3
Merkle Tree Inline graphic Inline graphic Inline graphic Yes No Inline graphic
Bloom Filter Inline graphic Inline graphic Inline graphic No Yes 1–2

Threat model

This subsection centralizes the adversary capabilities assumed in our analysis. To the best of our knowledge, the extended Canetti-Krawczyk model (eCK)35 describes an adversary more powerful than those depicted in the Dolev-Yao (DY) model36. Such a formidable adversary model presents significant threats to FL. Consequently, it is essential to incorporate the eCK adversary model when assessing the robustness of the proposed protocol. The eCK model specifies eight capacities that the adversary Inline graphic may possess.

  • Inline graphic can intercept, modify, insert, and delete any communication messages in the open channel.

  • Inline graphic can polynomially offline enumerate all items in the Cartesian product of ID space and password space Inline graphic.

  • To a password-based authentication in the scheme, Inline graphic can compromise the following one factor: (a) the user’s password or (b) data stored in the smart card.

  • Inline graphic can get any previous session key of the user.

  • Inline graphic can learn the KGC’s secret long-term key when considering the system’s eventual failure.

  • Inline graphic can obtain ephemeral secrets when testing the security of the session key.

  • Inline graphic can compromise a user to get his/her sensitive data, and subsequently impersonate the compromised user to participate in the next communication among the KGC, task publisher, and other users.

  • Inline graphic may be the KGC, only when assessing the security of the user’s password in the registration phase.

Message Authentication Codes (MACs)

We use MACs for lightweight message integrity and authenticity in FL exchanges. Concretely, an entity computes Inline graphic over the timestamp TS, the session key SK, and the message M (e.g., an encrypted model or its hash); the receiver verifies the tag via Inline graphic before acceptance. This aligns with the later “Model upload and Verification” phase and avoids the high cost of digital signatures.

Shamir’s (kn) threshold secret sharing

We employ Shamir’s (kn) threshold scheme37 to split the KGC master secret among n independent holders, ensuring that any k shares can reconstruct the secret while fewer than k reveal nothing; the detailed process appears later in Algorithm 1 during System Setup.

Algorithm 1.

Algorithm 1

Shamir’s (kn) threshold secret sharing.

Problem statement

Design goals

The goal of DAInline graphic4FL is to design a secure and efficient AKA protocol for FL. Specifically, the objectives are as follows:

  1. Authentication key agreement: DAInline graphic4FL achieves an anonymous AKA process with mitigated centralized issues, ensuring the semantic security defined formally in 6.1.

  2. Protection of local training data integrity: The protocol ensures the integrity of local training data, preventing any unauthorized modifications or tampering during the FL process. Given modelMAC, verification is performed using the function:
    graphic file with name d33e1160.gif
  3. Resistance to known attacks: DAInline graphic4FL must comprehensively addresses critical security threats including replay attacks, ephemeral secret leakage, impersonation attacks, and man-in-the-middle attacks and achieves forward secrecy. Our security analysis in section “Heuristic analyses” focuses exclusively on attack vectors relevant to federated learning environments.

  4. Efficient dynamic membership management: DAInline graphic4FL must provide efficient member management than static schemes16, allowing for real-time user additions or removals without needing to reconstruct the entire member list.

System architecture

We introduce the system model of DAInline graphic4FL in Fig. 2. It comprises five components: the KGC cluster (with multi-KGC architecture and threshold secret sharing), task publishers (initiating and managing FL training), users (local trainers with data privacy), the blockchain committee (decentralized state management and transaction verification), and IPFS (off-chain storage for large model updates).

Fig. 2.

Fig. 2

Architecture of DAInline graphic4FL.

KGC cluster: The KGC Cluster is structured as a dynamic consortium consisting of one active KGC and Inline graphic candidate KGCs. This cluster is responsible for creating the system’s public parameters and generating pseudonyms and secret values for users and task publishers to facilitate anonymous communication. The active KGC is not a permanent entity. Instead, it is randomly selected from the pool of candidate KGCs by a smart contract on the blockchain at system initialization or during a recovery process triggered by the committee. To ensure the security and resilience of the master secret key, it is securely split into n shares using Shamir’s (kn) threshold secret sharing scheme, and these n shares are distributed among all n members of the consortium, meaning no single member possesses the complete master secret key. Furthermore, to facilitate system recovery, critical user state information is encrypted and stored on the blockchain, ensuring it remains accessible even if the active KGC fails.

Users: Users act as trainers for local models. They acquire local models through training, perform mutual authentication with task publishers, upload model training data to IPFS, and submit upload requests to the blockchain along with a MAC.

Task publishers: Task publishers initiate training requests on the blockchain and negotiate session keys through the authentication process. Once the blockchain validates the reliability of the uploaded models from users, task publishers decrypt the models using the session keys and aggregate them.

Committee: The committee operates a consortium blockchain. It handles transaction submission (training requests and model uploads), verifies senders via the accumulator, caches verified transactions, and discards failed ones. Members can be appointed by a trusted organization or elected via a committee algorithm38 and reach consensus using an appropriate protocol39. If the KGC fails, the committee detects it and triggers recovery through the KGC management smart contract.

Interplanetary File System (IPFS): IPFS is utilized to store uploaded models. Due to the inefficiency and high cost of uploading large files directly to the blockchain, this system involves uploading model training data to IPFS and storing the returned addresses on the blockchain. We use IPFS for mature content-addressed storage and broad gateway/tooling support, keeping large payloads off-chain. Swarm and Filecoin are compatible but add tighter Ethereum coupling (Swarm) or storage-market overhead/latency (Filecoin), so we omit them here; backends are swappable without changing DAInline graphic4FL’s message flow40.

Initially, during the system setup phase, the committee triggers the smart contract to select an active KGC from KGC candidates using a verifiable random function (S-1, S-2). After that, the active KGC generates system parameters and initialize the system. Then, during the registration phase, both users and task publishers register with the active KGC, receiving pseudonyms and secret values while the KGC stores encrypted user states on-chain (R-1, R-2). Subsequently, the user and task publisher authenticate each other through blockchain-verified pseudonyms and negotiate a session key using dynamic accumulators for constant-time membership verification (A-1). Utilizing this session key, the user encrypts model updates and uploads them to IPFS, submitting only the content identifier and MAC to the blockchain (A-2). Following this, the committee verifies the legitimacy of the sender using the accumulator value Inline graphic and the task publisher checks MAC integrity (A-3). Finally, the task publisher retrieves encrypted models from IPFS, decrypts them using the corresponding session keys, and aggregates the models (A-4, A-5).

The proposed protocol

Main idea

The core of our DAInline graphic4FL protocol is built upon four key design ideas. (i) A hybrid architecture integrates a centralized Key Generation Center (KGC) for efficient registration and pseudonym generation with a decentralized blockchain for tamper-proof state backup and transaction verification. (ii) A (kn) threshold scheme distributes the KGC’s master secret key to enable verifiable recovery. (iii) A dynamic accumulator enables the blockchain committee to verify membership with constant-time operations, ensuring efficient and scalable management. (iv) Message Authentication Codes (MACs) are used to verify the integrity of encrypted model updates stored off-chain. The protocol encompasses a System Setup Phase, Registration and Authentication Phases for secure participation, a Dynamic Accumulator-based membership management mechanism, a Model Upload and Verification Phase to ensure model integrity, an Update Phase for managing dynamic membership and secret refreshment. This hybrid architecture combines the performance benefits of centralized computation with the fault tolerance and long-term integrity guarantees of decentralization. The meanings of symbols used in the protocol are detailed in Table 2.

System setup phase

The system setup phase establishes the foundational parameters and initializes the blockchain. This process is orchestrated by a KGC cluster, which consists of n candidate KGC nodes, and a blockchain committee. The setup proceeds as follows:

  • (i)

    Blockchain and accumulator initialization: The blockchain committee collaborates to initialize the consortium blockchain. They first generate the initial set F, which includes all committee members and the n candidate KGCs. For each entity k, an element Inline graphic is computed. The committee and the candidate KGCs then cooperate to compute the initial accumulator value Inline graphic, where Inline graphic and m is the number of initial members. This value Inline graphic, along with the set F and a timestamp, forms the genesis block of the blockchain.

  • (ii)

    Active KGC selection: The dedicated KGC management smart contract is first initialized with the list of n candidate KGCs, according to Algorithm 2. Upon initialization, the contract executes the SelectActiveKGC algorithm using on-chain randomness (e.g., the latest block hash) to verifiably select the first active KGC from the candidate pool. This node assumes the role of the active KGC for the initial phase.

  • (iii)

    Parameter generation by the active KGC: The newly selected active KGC performs the following steps to generate the system’s core cryptographic parameters: Key initialization: The active KGC randomly selects a master private key (MSK) and defines the public system parameter (n). Hash function selection: It chooses a secure one-way hash function Inline graphic, sets its identity (Inline graphic), and computes the pseudonymous identifier Inline graphic. Elliptic curve setup: It selects two large primes (p and q) that meet the security parameter (n), generates an elliptic curve Inline graphic over the prime finite field Inline graphic, and chooses a generator P of the q-order additive subgroup G based on Inline graphic. Subsequently, it selects its private key (Inline graphic) for the blockchain and generates the corresponding public key (Inline graphic). Parameter publication: The active KGC securely stores Inline graphic and publishes the system public parameters Inline graphic to all participants.

  • (iv)

    Threshold secret sharing and distribution: After generating the MSK, the active KGC applies Shamir’s (kn) threshold secret sharing scheme41 to split the master key MSK into n shares. These shares are then securely distributed to all n members of the KGC cluster, ensuring that any subset of k members can reconstruct the MSK, while any subset of fewer than k members gains no information about it. The detailed process is formalized in Algorithm 1.

Algorithm 2.

Algorithm 2

Verifiable KGC selection with initialization.

Upon completion of these steps, the system is fully initialized, and the active KGC is ready to handle subsequent operations such as user registration and authentication. For the remainder of the protocol description, unless otherwise specified, all references to the “KGC” denote the selected active KGC, who is responsible for managing the day-to-day operations of the system. The other members of the KGC cluster are referred to as candidate KGCs.

Registration phase

First, user Inline graphic locally generates a private-public key pair. Inline graphic randomly selects a 160-bit number Inline graphic as the private key and calculates the corresponding public key Inline graphic. Inline graphic then selects a password Inline graphic and compute Inline graphic. Then, Inline graphic initiates the following registration steps with the KGC.

  • (i)

    Identity selection and initial request: Inline graphic first randomly chooses an identity Inline graphic and sends Inline graphic along with the registration request to the KGC.

  • (ii)

    KGC processing and response: Upon receiving the registration request from Inline graphic, Inline graphic selects a secret number Inline graphic, then computes Inline graphic and computes Inline graphic. KGC stores Inline graphic in list Inline graphic securely. After that, KGC sends Inline graphic to Inline graphic via a secure channel. Then, the KGC computes Inline graphic and upload (Inline graphic, Inline graphic) to the blockchain. Lastly, KGC puts Inline graphic to the set F and updates the accumulator value Inline graphic to the blockchain.

  • (iii)

    User response and blockchain update: Inline graphic receives Inline graphic. Then Inline graphic randomly selects Inline graphic, calculates Inline graphic and publishes its Inline graphic in blockchain. Inline graphic then securely stores Inline graphic in a smart card.

  • (iv)

    Witness generation: Inline graphic generates an existential witness Inline graphic based on the accumulator value Inline graphic in the blockchain.

  • (v)

    Committee verification and block addition: A committee appends Inline graphic to the most recent block. Other committee members validate Inline graphic through Inline graphic; if valid, the block is added, and their witness Inline graphic is refreshed in the accumulator. Otherwise, the block is discarded.

The registration of task publisher Inline graphic is similar to Inline graphic’s. So, it is omitted here.

Authentication phase

The DAInline graphic4FL authentication involves three message rounds: (1) Inline graphic KGC: user initiates authentication with Inline graphic; (2) KGC Inline graphic: KGC forwards verified request with Inline graphic; and (3) Inline graphic: task publisher completes key agreement with Inline graphic.

In this phase, Inline graphic and Inline graphic can share parameters of the model securely after that Inline graphic and Inline graphic authenticate each other. The detailed steps in the authentication phase are shown below. To enhance the understanding of the authentication phase, the scheme’s workflow and detailed cryptographic computation process is illustrated in Fig.  3.

Fig. 3.

Fig. 3

Authentication and session key agreement in DAInline graphic4FL.

  • (i)

    Identity and password verification: User Inline graphic enters their identity Inline graphic and password Inline graphic. The smart card computes Inline graphic, where Inline graphic is the smallest positive integer such that Inline graphic, with O denoting the point at infinity on the elliptic curve. It then retrieves Inline graphic from the blockchain using Inline graphic, selects a random nonce Inline graphic, records the current timestamp TS, and sends the authentication request Inline graphic to the KGC over a public channel.

  • (ii)

    KGC time validation and data retrieval: Upon receiving the authentication request Inline graphic from Inline graphic, Inline graphic verifies the time validity by checking Inline graphic, where Inline graphic is the maximum time threshold for accepting messages, and Inline graphic is the current time. If the time is invalid, Inline graphic discards the request; otherwise, Inline graphic goes to the next step. Inline graphic use Inline graphic to check for Inline graphic and retrieves Inline graphic in the list Inline graphic. Then Inline graphic computes the Inline graphic.

  • (iii)

    Parameter verification and authentication by KGC: Inline graphic checks the validation of Inline graphic. If not, Inline graphic discards the authentication request; otherwise, Inline graphic can authenticate Inline graphic and retrieves Inline graphic in the list Inline graphic through Inline graphic. Finally, Inline graphic sends message Inline graphic to Inline graphic by a public channel with Inline graphic.

  • (iv)

    Time check and data extraction by Inline graphic: Upon receiving the message Inline graphic from KGC, Inline graphic initially checks the validation of time by Inline graphic. If so, Inline graphic extracts Inline graphic from the public channel and calculates Inline graphic.

  • (v)

    Final validation and message transmission by Inline graphic: Inline graphic validates Inline graphic. If the validation fails, Inline graphic denies the communication request. Otherwise, Inline graphic can verify KGC and then proceed with the following steps. Inline graphic extracts newest Inline graphic and Inline graphic and then computes Inline graphic. Then Inline graphic validates if Inline graphic. If not, Inline graphic discards the communication request. Otherwise, Inline graphic chooses a random number Inline graphic and computes and then transmits message Inline graphic to Inline graphic.

  • (vi)

    Completion of authentication by Inline graphic: When Inline graphic obtains the message Inline graphic from Inline graphic, Inline graphic first computes Inline graphic and verifies Inline graphic. If so, Inline graphic can authenticate Inline graphic and establish the common session key Inline graphic. If not, Inline graphic discards the communication request.

Model upload and verification phase

After the authentication process, both Inline graphic and Inline graphic share the same session key SK. Then Inline graphic can encrypt his/her model training data to C, using symmetric encryption algorithms, such as AES. Given that transmitting the local model on the blockchain would significantly increase communication costs, Inline graphic initially stores the encrypted model C on IPFS, and the corresponding transaction includes the IPFS address addr. Specifically, Inline graphic initiates an upload transaction by calculating Inline graphic, where Inline graphic is the hash of the encrypted model C. Inline graphic then publishes the transaction Inline graphic to the blockchain.

To realize a unified workflow that integrates authentication with model transmission, the protocol binds upload immediately to the just-established session. This design mitigates the downsides of sequential decoupling by eliminating a TOCTTOU (Time-of-Check to Time-of-Use) window and preventing re-binding/replay: at upload time the committee verifies membership with Inline graphic and Inline graphic, and the task publisher re-checks the MAC using the same SK. Freshness via Inline graphic and constant-time accumulator verification ensure atomicity with respect to revocation and state changes, while lightweight per-upload session-key updates further reduce exposure without full re-authentication.

Upon receiving transaction Inline graphic, the blockchain committee first verifies the timeliness by checking Inline graphic. The committee then confirms the node’s presence in the Accumulator using Inline graphic. If confirmed, the transaction is added to the block. The task publisher subsequently retrieves the transaction from the blockchain and extracts C from IPFS by addr. They compute Inline graphic and checks if Inline graphic. If they match, the model is accepted; otherwise, it is discarded.

Dynamic update mechanisms

In this update phase, we address the updating of session keys with dynamic update mechanisms, Inline graphic, membership details, and users’ passwords.

Update of session keys

In scenarios where each upload of model training data necessitates a distinct session key, traditional approaches typically entail re-authentication and key agreement, thereby imposing substantial communication overhead. Our method introduces an efficient mechanism for updating session keys after initial authentication, significantly reducing associated communication costs.

Upon successful authentication, both the user Inline graphic and the task publisher Inline graphic securely store their respective Inline graphic values, timed with Inline graphic. During this phase, it is imperative that Inline graphic remains within its effective period to ensure the validity of Inline graphic. Both parties merely need to generate new random values Inline graphic and Inline graphic, subsequently publishing Inline graphic and Inline graphic on the blockchain. Thereafter, they are able to calculate the new session key Inline graphic. For highly sensitive data requiring stringent security, setting Inline graphic to 0 mandates a full re-authentication process instead of utilizing the shortcut for key negotiation and authentication.

Update of PID and secret values

To ensure anonymity and untraceability, Inline graphic may request immediate identity updates from the KGC. Specifically, when Inline graphic updates their identity and secret values with the KGC, both entities adopt new identities and secrets as follows: Inline graphic. Subsequently, the KGC records the relationship between Inline graphic and Inline graphic, and then refreshes the accumulator value using Inline graphic.

Update of membership

Considering the addition of new members, they must adhere to the established registration procedure. For members intending to leave, such as user Inline graphic, a resignation transaction is sent to the blockchain. The Committee then executes Inline graphic to exclude the member from the accumulator set Inline graphic and updates the accumulator value Inline graphic in the subsequent block. Thereafter, the KGC uses the participant’s Inline graphic to locate Inline graphic’s information and deletes it from the list Inline graphic.

Update of users’ password

Inline graphic can also change his/her password with the following steps:

  1. Inline graphic first inputs his/her identity Inline graphic and password Inline graphic, and the smart card will compute: Inline graphic.

  2. Inline graphic selects the new password Inline graphic and computes Inline graphic.

  3. Then he/she stores Inline graphic in a smart card securely.

Update of active KGC and MSK

The update of MSK begins when a committee member triggers the KGC rotation contract. The contract executes SelectActiveKGC (Algorithm 2) to verifiably elect a new KGC using on-chain randomness.

The newly elected KGC collects the shares from the committee members and reconstructs the previous master secret key MSK. Using MSK, it recovers the hidden state Inline graphic from the on-chain pseudonym and ciphertext pair via:

graphic file with name d33e2451.gif

After that it processes any backlogged registration requests that are still within their valid time window. Then, the KGC generates a new master secret key Inline graphic and re-encrypts the data as:

graphic file with name d33e2460.gif

and uploads Inline graphic to the blockchain. Finally, the new KGC generates Inline graphic and distributes its (kn) Shamir shares securely to the n committee members.

Upon completion of these steps, the system resumes normal operation with the new active KGC.

Security analyses of the proposed protocol

We analyzed the security and performance of the proposed protocol. The security analysis includes: (1) Provable security, where we demonstrate the semantic security of the session key in this section; (2) Heuristic analysis, which shows that the protocol can resist known attacks. The performance analysis involves the protocol’s functionality, communication and computation, where we compare the proposed DAInline graphic4FL with three related schemes.

Formal security analysis

In this section, based on the eCK adversarial model, we give a security formal proof that the adversary cannot compromise the semantic security of the session key in our proposed protocol.

Note that the security of our scheme fundamentally relies on two well-known hard problems in elliptic curve cryptography. The first is the Elliptic Curve Discrete Logarithm Problem (ECDLP), which posits that it is computationally infeasible for an adversary Inline graphic to determine the scalar Inline graphic given a point Inline graphic on an elliptic curve and its scalar multiple Inline graphic, even with knowledge of both Inline graphic and Inline graphic42. The second is the Elliptic Curve Computational Diffie-Hellman Problem (ECCDHP), which states that, given two points Inline graphic and Inline graphic, where Inline graphic and Inline graphic are unknown scalars in Inline graphic, it is computationally infeasible for any polynomial-time adversary to derive the shared key Inline graphic with significant probability9.

Basics for formal proof

In protocol Inline graphic, there are three participants: the user Inline graphic, the task publisher Inline graphic, and the KGC. Before initiating the simulation, the simulator begins by selecting an elliptic curve Inline graphic over a prime finite field Inline graphic and chooses a generator P from the additive subgroup of order q, where p and q are large prime numbers. The length of q meets Inline graphic. Following this, the user Inline graphic obtains personal information Inline graphic, along with a smart card containing {Inline graphic}. Meanwhile, the active KGC is selected by the smart contract and it generates the master secret key MSK, applies Shamir’s (kn) threshold secret sharing scheme to split MSK into n shares Inline graphic, and securely distributes each share to n independent KGC candidates, and the task publisher Inline graphic stores information Inline graphic secretly.

In the proof, three entities are instantiated individually as follows: Inline graphic is instantiated as Inline graphic, Inline graphic as Inline graphic, and KGC as Inline graphic. When we want to represent any of them, we can simplify their notation to Inline graphic. Each instance is treated as an oracle, meaning that its state will change from accept, reject, or return “Inline graphic” (indicating no response) depending on whether the input message is valid, invalid, or null.

Following, we provide some terms used in this proof.

Inline graphic. When instance Inline graphic successfully receives the final expected communication in the protocol, it enters an acceptance state. During this session, all transmitted and received messages are sequentially concatenated to generate the session identifier for instance Inline graphic.

Inline graphic. Instances Inline graphic and Inline graphic are regarded as matched when the following conditions achieve that: (a) both are in an acceptance state, (b) they authenticate each other using the identical session identifier.

Inline graphic. The eCK adversary Inline graphic is presumed to interact with the simulator and honest parties via oracle queries. Inline graphic tries to compromise the integrity of authentication messages or the confidentiality of the session key by leveraging the oracle responses. The types of queries that Inline graphic is allowed to perform are outlined below.

  • Inline graphic(Inline graphic). In this query, Inline graphic emulates the full authentication procedure and captures the communications of Inline graphic, KGC, and Inline graphic.

  • Inline graphic(Inline graphic). Using this query, Inline graphic can transmit message m to instance Inline graphic to initiate an attack, with the simulator replying by protocol Inline graphic.

  • Inline graphic (Inline graphic). Through this query, Inline graphic obtains previous session keys from its corresponding partner instance.

  • Inline graphic (Inline graphic). This query grants the adversary Inline graphic access to temporary keys, such as nonce values or short-term secret data.

  • Inline graphic(Inline graphic). Through this query, Inline graphic can retrieve critical data stored on the user’s smart card.

  • Inline graphic(Inline graphic). This query allows Inline graphic to obtain the master secret key MSK along with the private key Inline graphic.

  • Inline graphic(Inline graphic). Using this query, Inline graphic can access confidential information belonging to Inline graphic.

Inline graphic. An instance, whether Inline graphic, Inline graphic, or Inline graphic, is considered to be fresh if Inline graphic has not gained access to the session key between Inline graphic and Inline graphic.

Inline graphic(Inline graphic). This query is designed to assess the semantic security of the session key SK, and Inline graphic is allowed to execute this query only once. In the context of protocol Inline graphic, the instance Inline graphic can either represent Inline graphic or Inline graphic. If the instance Inline graphic has already been queried by Inline graphic(Inline graphic), then the query will return “Inline graphic” (null). Otherwise, the oracle will flip a fair coin b. If Inline graphic, Inline graphic(Inline graphic) provides the actual session key SK to Inline graphic; otherwise, it returns a random string with the same length as SK.

Inline graphic. In protocol Inline graphic, a PPT adversary Inline graphic can perform several queries including Execute, Send, Compromise, and Test. Inline graphic aims to guess the outcome of the coin flip b in the Test query and submits its guess Inline graphic. Let Inline graphic represent the probability that Inline graphic correctly guesses Inline graphic. The adversary’s advantage in breaking the semantic security of the session key in protocol Inline graphic is defined as:

graphic file with name d33e3019.gif

Semantic security proof

Following, we give a detailed security proof to indicate the advantage of adversary breaking the session key’s semantic security can be negligible.

Theorem 1

Let Inline graphic represent the proposed protocol, and Inline graphic and Inline graphic represent the probability advantage of a PPT adversary Inline graphic in solving the ECDLP and ECCDHP, respectively. If a PPT adversary Inline graphic carries out Inline graphic Execute, Inline graphic Send, Inline graphic Hash, then the advantage that Inline graphic has in compromising Inline graphic is negligibly:

Inline graphic

Proof

In the step-by-step proof, a sequence of games is defined from GameInline graphic to GameInline graphic. Let Inline graphic denote the likelihood that Inline graphic successfully guesses the b in Test query in GameInline graphic, for Inline graphic.

GameInline graphic: This game models a real-world attack scenario under the random oracle model. A bit b is chosen at the beginning. Therefore:

graphic file with name d33e3168.gif 1

GameInline graphic: This game introduces a hash table Inline graphic. Whenever Inline graphic makes a hash query Inline graphic, the hash oracle Inline graphic looks for Inline graphic in the table Inline graphic. If the value Inline graphic is already stored, Inline graphic returns it. If not, it creates a random value Inline graphic, and sends it to Inline graphic, and records the pair Inline graphic in Inline graphic.

In this scenario, Inline graphic tries to use the available hash list to issue the Test query, aiming to figure out whether the session key is real or randomly generated. Factually, the session key Inline graphic is derived using secret elements like Inline graphic, Inline graphic, Inline graphic of Inline graphic, Inline graphic, and random numbers Inline graphic and Inline graphic. Without knowledge of these secret components, Inline graphic cannot calculate SK and is left to guess, making it impossible to determine if Inline graphic or Inline graphic with certainty.

As a result, the probability that Inline graphic can succeed in GameInline graphic by eavesdropping is no greater than its advantage in GameInline graphic, meaning:

graphic file with name d33e3304.gif 2

GameInline graphic: In this game, adversary Inline graphic attempts to deceive one of the participants into accepting a fabricated message by issuing multiple Send and Hash queries. Unlike GameInline graphic and GameInline graphic, Inline graphic might gain an increased advantage by finding collisions. If the following collision events occur, the game is terminated:

  • (i)

    A collision in the hash outputs, occurring with a probability of Inline graphic, where l represents the bit length of the hash output.

  • (ii)

    Collisions between the random values (Inline graphic, Inline graphic, Inline graphic, Inline graphic) may occur with a probability of Inline graphic.

Thus, we have:

graphic file with name d33e3381.gif 3

GameInline graphic: In this game, adversary Inline graphic attempts to guess the values of Inline graphic, Inline graphic, ACK, and Inline graphic without making any hash queries.

It follows that:

graphic file with name d33e3413.gif 4

GameInline graphic: Here, adversary Inline graphic tries to deduce the value of Inline graphic without issuing any hash queries.

Similarly, we obtain:

graphic file with name d33e3433.gif 5

GameInline graphic: In this game, adversary Inline graphic executes a lost smart card attack by issuing a Inline graphic(Inline graphic) query. With the help of the “fuzzy keyword and honeyword” approach, the probability of Inline graphic guessing the correct user password is no more than Inline graphic , where constants Inline graphic and Inline graphic relate to the Inline graphic43. In this case, Inline graphic makes up to Inline graphic attempts within the password space Inline graphic. Therefore, we derive:

graphic file with name d33e3492.gif 6

GameInline graphic: Here, adversary Inline graphic interacts with the oracles Inline graphic(Inline graphic) and Inline graphic(Inline graphic) to obtain outdated session keys Inline graphic and random values Inline graphic, Inline graphic. Nonetheless, without knowledge of the secrets Inline graphic and Inline graphic, Inline graphic is unable to compute Inline graphic. Alternatively, Inline graphic might attempt to find a hash collision.

Hence, we have:

graphic file with name d33e3558.gif 7

GameInline graphic: In this scenario, Inline graphic issues a Inline graphic(Inline graphic) query to access the task publisher Inline graphic’s secret values, such as Inline graphic and Inline graphic. Despite successfully compromising Inline graphic, adversary Inline graphic is unable to derive Inline graphic from Inline graphic or Inline graphic from Inline graphic, as solving the ECDLP in polynomial time remains infeasible for Inline graphic.

That is, we can have:

graphic file with name d33e3624.gif 8

GameInline graphic: In this game, adversary Inline graphic is no longer allowed to use the Execute, Send, or Corrupt queries and instead tries to calculate the session key directly. Since there is no efficient algorithm to solve the ECCDHP, Inline graphic’s advantage in recomputing Inline graphic to retrieve Inline graphic, denoted as Inline graphic, is negligible.

Therefore, we conclude:

graphic file with name d33e3666.gif 9

At this stage, the probability of Inline graphic successfully guessing the correct session key does not significantly exceed Inline graphic, meaning that Inline graphic.

By equations (1) through (9) and leveraging the triangle inequality, we get

graphic file with name d33e3685.gif

where

graphic file with name d33e3689.gif

In conclusion, adversary Inline graphic does not hold a significant advantage Inline graphic in breaking the semantic security of session key SK. The advantage is bounded by the following expression: Inline graphic to break the semantic security of SK, where Inline graphic. Inline graphic

Heuristic analyses

This section offers a comprehensive analysis of the proposed scheme’s security features, which include mutual authentication, session key establishment, and forward secrecy. Additionally, it illustrates the scheme’s efficacy in mitigating various attacks, such as replay attacks, password guessing, and man-in-the-middle attacks. We also executed simulations for four representative attacks–replay, impersonation, man-in-the-middle (MITM), and ephemeral secret leakage (ESL)–and observed fast rejection in all cases: replay 0.068 ms (± 0.017), impersonation 0.249 ms (± 0.039), MITM 0.495 ms (± 0.010), and ESL 1.797 ms (± 0.037). Note that the experiments were conducted on a virtualized computing environment based on an AMD EPYC 9754 128-Core Processor. The virtual machine allocated for the experiments provided 8 CPU cores and 16 GB of RAM, running on Ubuntu 24.04.2 LTS.

Mutual authentication

Mutual authentication is the process where two parties verify each other’s identities. In the proposed DAInline graphic4FL, the KGC authenticates Inline graphic by verifying Inline graphic. Meanwhile, Inline graphic authenticates the KGC by verifying Inline graphic and authenticates Inline graphic by verifying Inline graphic. Additionally, Inline graphic authenticates Inline graphic by verifying Inline graphic, thereby achieving mutual authentication.

Session key establishment

The session key agreement ensures that no party can compute the session key on its own or predict it in advance without cooperation from others. Factually, the session key Inline graphic relies on contributions from Inline graphic’s (Inline graphic, Inline graphic, Inline graphic) and Inline graphic’s (Inline graphic, Inline graphic, Inline graphic), ensuring that neither Inline graphic, KGC, nor Inline graphic can independently derive the session key.

Conditional privacy protection

Conditional privacy protection ensures that under normal circumstances, user privacy is maintained through anonymity and identity protection. However, in the event of malicious activity, the KGC can trace and reveal the true identity of the user. The KGC assigns pseudonyms Inline graphic to each node for transactions, where MSK is divided into n shares and distributed among multiple independent committee nodes using Shamir’s (kn) threshold secret sharing scheme. To uncover true identities, an adversary would need to compromise at least k out of n committee nodes to reconstruct MSK, which is considered practically infeasible. This ensures effective privacy protection. Each pseudonym Inline graphic is valid for a specific authentication, and after completing an upload operation, the pseudonym will be a new pseudonym Inline graphic. Linking Inline graphic and Inline graphic requires simultaneous access to Inline graphic, Inline graphic, and Inline graphic, ensuring that pseudonyms from the same source remain unlinked.

Forward secrecy

Forward secrecy ensures that, even if long-term secrets such as the KGC x and MSK are compromised, previous session keys remain secure. Consider a scenario where an adversary knows x, MSK, Inline graphic, Inline graphic, Inline graphic and Inline graphic. Despite this knowledge, given the complexity of the ECCDHP, the adversary cannot compute Inline graphic to derive the session key SK, thereby preserving the protocol’s forward secrecy.

Data integrity of model updates

Data integrity means that the task publisher accepts only the exact ciphertext bytes produced by the authenticated client within the current freshness window. To forge a model update, an adversary must produce a valid on-chain message Inline graphic. However, the adversary cannot forge the MAC, because the message authentication code is computed as Inline graphic, which requires the session key SK. Therefore, data integrity is preserved.

Password guessing attacks

As defined in44, password-guessing attacks can be classified into two categories: those targeting validation data stored in the smart card (Attack I) and those exploiting verification data transmitted over a public channel (Attack II). In Attack I, the smart card stores only password-related values such as Inline graphic, which leaves no accessible verification data for attackers to exploit. In Attack II, the password verification process relies on ACK. Even if attackers acquire Inline graphic and retrieve ACK by accessing the smart card, they cannot verify guessed passwords or identities (Inline graphic or Inline graphic) because the modular operations in Inline graphic ensure security.

Replay attacks

Replay attacks involve an attacker attempting to resend old messages to pass verification. However, in each session, Inline graphic and Inline graphic generate new random values, Inline graphic or Inline graphic, ensuring the uniqueness and freshness of the messages. Consequently, the attacker cannot reuse previous messages or compute the session key to bypass Inline graphic’s verification.

Man-in-the-Middle (MITM) attack

In a Man-in-the-Middle (MITM) attack, an adversary intercepts the communications between the user and Inline graphic, capturing the messages Inline graphic sent by the user and the responses Inline graphic from Inline graphic. The adversary may attempt to forge a new set of messages Inline graphic or replay old ones. However, they are unable to convince Inline graphic or Inline graphic that they hold the secret values Inline graphic, Inline graphic, or the private keys Inline graphic and Inline graphic. Consequently, the attacker fails to pass the authentication process, effectively preventing the MITM attack.

Ephemeral secret leakage (ESL) attack

This type of attack, also known as a transient key leakage attack35,45, occurs when an attacker attempts to derive the session key by intercepting temporary session data, such as the random values Inline graphic and Inline graphic. In our proposed DAInline graphic4FL, the session key SK is produced by combining both short-term random values and long-term secret data, including Inline graphic and Inline graphic. Consequently, even if an attacker obtains Inline graphic and Inline graphic, they cannot compute the session key SK, rendering the attack ineffective (Table 4).

Table 4.

Security functionalities comparisons of all related authentication schemes.

Schemes Year Criteria
IInline graphic IInline graphic IInline graphic IInline graphic IInline graphic SInline graphic SInline graphic SInline graphic SInline graphic SInline graphic
Huang et al.9 2024 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
He et al.46 2023 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Fan et al.10 2023 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Parameswarath et al.15 2022 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
Srinivas et al.47 2020 Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic
DA34FL Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic Inline graphic

Impersonation attack

For an external malicious node, lacking the private key and long-term secret values of a legitimate node, it cannot impersonate a legitimate entity to communicate with the KGC. For a legitimate user, computing the private key and long-term secret values of the KGC during the session key negotiation process is infeasible due to the ECDLP, thereby preventing impersonation of the KGC.

Experiments and performance analyses

In this section, we present a comprehensive performance analysis, including functionality comparisons and cost estimation comparisons among five state-of-the-art (SOTA) user authentication protocols. Note that the experiments were conducted on a virtualized computing environment based on an AMD EPYC 9754 128-Core Processor. The virtual machine allocated for the experiments provided 8 CPU cores and 16 GB of RAM, running on Ubuntu 24.04.2 LTS.

Functionality analysis

To evaluate the strengths and weaknesses in terms of functionality, the widely recognized 10 criteria48 were employed. These criteria comprise five ideal attributes (I) and five security attributes (S), as detailed in Table 3. In terms of ideal attributes, the DAInline graphic4FL outperforms existing schemes in several key areas. For password friendliness (Inline graphic), unlike Fan et al.’s scheme which does not permit users to modify their passwords locally10, both Huang et al. and the proposed protocol support this feature9. Additionally, He et al.’s scheme46 also supports local password modification, but Srinivas et al.’s scheme47 enhances this by integrating robust password management mechanisms without compromising usability. Regarding key agreement (Inline graphic), Parameswarath et al.’s scheme15 lacks the capability to establish a session key, and He et al.’s scheme46 does not provide mutual authentication (Inline graphic), potentially limiting its practicality in certain contexts. All schemes except Parameswarath et al.’s15 offer mutual authentication (Inline graphic). Furthermore, Parameswarath et al.’s use of a password verifier table (Inline graphic) poses a risk of password leakage15, while He et al.’s scheme46 does not fully safeguard mutual authentication, leaving it susceptible to specific attacks.

Table 3.

10 Criteria for evaluating authentication schemes.

Category ID Criteria Definition
Ideal attributes IInline graphic Password friendly

Users can freely select

and locally modify their

passwords

IInline graphic Sound repairability

Users can join

dynamically, and smart

card can be revoked

IInline graphic Key agreement

Users and task publishers

must establish a session

key after authentication

IInline graphic Mutual authentication

All parties should

authenticate each

other’s identities

IInline graphic

No password verifier

table

Only users store their

password-related data

Security attributes SInline graphic User anonymity

Adversaries cannot

deduce or track users’

identities

SInline graphic

No password

exposure

Privileged participants

(e.g., KGC administrators)

cannot access user

passwords during

registration

SInline graphic Forward secrecy

Even if KGC’s long-term

key is compromised, the

session key remains

secure

SInline graphic

Resistance to known

attacks

The protocol withstands

impersonation, MITM,

replay, stolen verifier,

and DoS attacks

SInline graphic

Resistance to smart

card loss attack

The protocol remains

secure even if a smart

card is lost

In terms of security attributes, the proposed protocol, along with other schemes, ensures user anonymity (Inline graphic), preventing adversaries from identifying or tracking users. Regarding password exposure (Inline graphic), schemes by Huang et al.9, Fan et al.10, and the proposed protocol prevent administrators from accessing users’ passwords during registration, a feature missing in Parameswarath et al.’s scheme15. However, He et al.’s scheme46 fails to adequately protect against password exposure during registration. The proposed protocol also supports forward secrecy (Inline graphic), safeguarding past session keys even if the long-term key is compromised, a feature absent in the schemes of Parameswarath et al. and Srinivas et al.15,47. Regarding resilience to known attacks (Inline graphic), Huang et al.’s scheme9 cannot defend against impersonation attacks, nor can Parameswarath et al.’s and Srinivas et al.’s schemes15,47 defend against ESL attacks. For Inline graphic, He et al.’s scheme46 cannot effectively resist the smart card loss attacks. In contrast, the proposed DAInline graphic4FL protocol effectively addresses these vulnerabilities, providing robust protection against known attacks.

Cost analysis

In this subsection, we conduct a performance analysis comparing communication and computation costs to demonstrate the efficiency of the proposed DAInline graphic4FL. To assess communication costs, the lengths of each parameter are detailed in Table 6. Table 5 presents a comparison of communication costs across all evaluated schemes. The proposed DAInline graphic4FL achieves a total communication cost of 2164 bits, approximately 72.5% lower than that of Parameswarath et al.15, indicating a significant enhancement in communication efficiency. Although our communication cost is higher than that of Fan et al.’s10 and Huang et al.’s9 schemes, the DAInline graphic4FL offers improved security features. Notably, our protocol introduces an efficient method to update session keys without completing the entire authentication process, reducing the average cost to levels comparable to the aforementioned schemes.

Table 6.

The length of all terms.

Symbols Bits Symbols Bits
module (Inline graphic) 32 time stamp (t) 32
ECC point (p) 256 random/nonce (rd) 160
hash value (h) 160 user’s ID (ID) 128
public key (PK) 512 private key (x) 256
password (PW) 160 secret value (sS) 160

Table 5.

Comparisons of computation and communication costs among authentication protocols.

Schemes Year Computational cost Total
communication
cost : bits
User Task publisher KGC
Inline graphic 9 2024 Inline graphic Inline graphic 800
Inline graphic 46 2023 Inline graphic Inline graphic 1782
Inline graphic 10 2023 Inline graphic Inline graphic 1472
Inline graphic 15 2022 Inline graphic Inline graphic Inline graphic 7872
Inline graphic 47 2020 Inline graphic Inline graphic Inline graphic 2656
DAInline graphic4FL Inline graphic Inline graphic Inline graphic 2164

Compared to He et al.’s scheme46, the DAInline graphic4FL incurs a slightly higher communication cost (2164 bits versus 1782 bits). However, He et al.’s scheme lacks essential security features such as user anonymity (SInline graphic) and resistance to known attacks (SInline graphic), making it less suitable for secure FL environments. Srinivas et al.’s scheme47, with a communication cost of 2656 bits–approximately 22.8% higher than our protocol–also falls short in computational efficiency and security robustness, lacking features like forward secrecy (SInline graphic) and resistance to smart card loss attacks (SInline graphic). Our protocol effectively balances the increased communication cost with stronger security, ensuring robust protection against potential attacks in FL settings.

As shown in Tables 7 and 8, DAInline graphic4FL incurs a total computational cost of 0.653 ms. This represents a 7.0% reduction compared to He et al.’s scheme (0.702 ms)46 and is approximately 29.0% faster than the protocol of Srinivas et al. (0.920 ms)47, thereby demonstrating superior efficiency in latency-sensitive federated learning scenarios. Although our cost exceeds those reported by Parameswarath et al. (0.593 ms)15, Huang et al. (0.316 ms)9, and Fan et al. (0.276 ms)10, respectively–DAInline graphic4FL compensates for this modest overhead by integrating additional lightweight cryptographic operations and enabling session-key updates without full re-authentication, thereby enhancing overall security and robustness.

Table 7.

Running time of different cryptographic operations.

Symbol Description Time (ms)
Inline graphic 256-bit ECC scalar point multiplication 0.065
Inline graphic Biometric-fuzzy extractor 0.065
Inline graphic Hash Operation Time 0.004
Inline graphic Group Signature Generation Time 0.445
Inline graphic Group Signature Verification Time 0.042

Table 8.

Comparison of total computational costs per authentication for different schemes.

Authentication schemes Total computational
cost (ms)
Huang et al.9 0.316
He et al.46 0.702
Fan et al.10 0.276
Parameswarath et al.15 0.593
Srinivas et al.47 0.920
DAInline graphic4FL 0.653

In summary, DAInline graphic4FL achieves a favorable trade-off between performance and security, rendering it suitable for resource-constrained federated learning environments. By delivering lower latency than the schemes of He et al. and Srinivas et al. 47, while providing more comprehensive security features than the faster yet less feature-rich protocols of Huang et al. 9, Fan et al. 10, and Parameswarath et al. 15, DAInline graphic4FL offers a practical and secure authentication solution for federated learning.

Dynamic accumulator performance evaluation

We conducted a comprehensive performance evaluation of our dynamic accumulator under varying system scales. Specifically, we measured both the latency of three fundamental operations (member addition, witness creation, and membership verification) and the peak memory consumption during accumulator operations, while scaling the number of users from 100 to 10,000. Each measurement was repeated 50 times to ensure statistical significance, and we report both the average and standard deviation in Table 9.

Table 9.

Dynamic accumulator performance metrics with different user counts.

Users Add
(ms/u)
Witness creation
(ms)
Membership
verification (ms)
Peak memory
(KB)
100 12.29 (± 6.75) 33.09 (± 6.34) 11.49 (± 6.34) 27.11 (± 10.43)
500 12.18 (± 7.36) 33.74 (± 9.72) 11.97 (± 9.75) 64.22 (± 0.02)
1,000 12.30 (± 7.61) 33.05 (± 6.81) 11.34 (± 6.83) 88.08 (± 0.02)
2,000 12.23 (± 7.63) 32.82 (± 5.47) 11.68 (± 5.46) 231.88 (± 0.02)
5,000 12.11 (± 7.39) 34.28 (± 8.51) 12.85 (± 8.50) 877.22 (± 0.02)
10,000 12.16 (± 7.35) 33.27 (± 5.96) 11.62 (± 5.94) 998.59 (± 0.02)

As shown in Table 9, the dynamic accumulator demonstrates excellent scalability and efficiency across both computational and memory dimensions. From a latency perspective, the average time for adding a new member remains consistently stable in the range of 12.1–12.3 ms per user, with minimal fluctuations. This demonstrates nearly linear performance even as the number of users increases from 100 to 10,000. The witness creation latency remains stable around 32–35 ms, with only minor variations, and does not show any significant increase as the number of nodes grows. Similarly, the membership verification latency consistently stays within the range of 11–13 ms, with standard deviations generally within acceptable bounds, indicating consistently efficient verification operations.

From a memory perspective, the memory utilization grows sub-linearly with respect to the number of members, remaining under 1,000 KB even at 10,000 users. This demonstrates exceptional memory efficiency, as the accumulator maintains a compact cryptographic representation of the entire membership set without storing individual member records. The extremely low variance across iterations (on the order of 0.02 KB for most scales) indicates highly stable and predictable memory behavior.

Overall, these performance metrics validate the Inline graphic time complexity of the system’s core cryptographic operations and demonstrate minimal storage overhead. Even under dynamic stress tests with user counts scaling up to 10,000, the system maintains low and stable latency with sub-linear memory growth. This confirms that DAInline graphic4FL is well-suited for resource-constrained environments and large-scale federated learning deployments, where frequent participant changes and efficient membership management are critical requirements.

Implementation

For practical deployment, use widely supported 128-bit security defaults (ECC P-256, SHA-256 as the hash h, HMAC-SHA-256 for MACs, and AES-CTR for encrypting the model ciphertext C with random IVs using an encrypt-then-MAC construction), keep a tight but realistic timestamp window (Inline graphic 1–5 minutes with clock sync), pin IPFS content across multiple nodes, and choose Shamir’s threshold (kn) by balancing collusion resistance and availability: pick k so that Inline graphic, where f is the maximum tolerated number of compromised custodians and u the maximum expected offline custodians; in practice, Inline graphic for Inline graphic, Inline graphic for Inline graphic, and Inline graphic for Inline graphic offer balanced trade-offs, while larger k (e.g., Inline graphic) hardens security at the cost of a higher recovery quorum.

Integration with mainstream FL frameworks (e.g., TensorFlow Federated and PySyft) is straightforward because DAInline graphic4FL sits beneath the learning logic as a thin authentication layer. Clients run the AKA handshake once per training session to derive SK, then attach to each update a message containing Inline graphic–where C is the ciphertext of the serialized model delta, TS enforces bounded freshness, Inline graphic provides conditional anonymity, and Inline graphic binds integrity to the ciphertext. The client-side hook executes before serialization/transmission (hashing, encryption, and MAC computation); the aggregator-side hook executes on receipt (timestamp check, MAC verification, accumulator membership verification when enabled), and only then decrypts before handing the plaintext update to the framework’s standard aggregator. In practice this can be implemented as gRPC/HTTP middleware or message pre/post-processors, wrapping client-update RPCs in TensorFlow Federated and tensor/state send/receive paths in PySyft, without changing model formats, optimizers, or aggregation code; DAInline graphic4FL treats updates as opaque bytes.

Conclusion and future work

AKA is crucial for FL, as it prevents unauthorized data leakage and enhances data security. To overcome the limitations of existing AKA technologies, we introduces a robust DAInline graphic4FL protocol utilizing blockchain, Message Authentication Code (MAC), and dynamic accumulator technologies. The DAInline graphic4FL design ensures identity verification within FL, as well as the security and integrity of messages, and facilitates dynamic and efficient membership management. Security analysis confirms that DAInline graphic4FL is robust against the attack vectors analyzed in this work and secures session keys. Performance analysis demonstrates that DAInline graphic4FL strikes an optimal balance between security and performance, making it well-suited for FL environments. Following, future work will focus on exploring the application of DAInline graphic4FL in more complex FL scenarios, such as mobile FL environments. Additionally, we plan to investigate the integration of emerging technologies, such as homomorphic encryption and differential privacy, to further enhance the security and privacy of DAInline graphic4FL in FL applications. While the present ECC and symmetric-based instantiation is not quantum-resistant, future work will explore quantum-resilient techniques such as quantum-resilient accumulators to provide end-to-end PQ security.

Author contributions

Conceptualization, S.L. and K.F.; methodology, S.L.; validation, S.L., Y.Z. and J.B.; formal analysis, S.L.; investigation, S.L., Y.Z. and J.B.; resources, K.F.; writing—original draft preparation, S.L.; writing—review and editing, Y.Z., J.B. and K.F.; visualization, S.L.; supervision, K.F.; project administration, K.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors. All authors declare no financial or non-financial conflicts of interest related to this work.

Data availability

No datasets were generated or analysed during the current study.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Chinnasamy, P., Vinodhini, B., Praveena, V., Vinothini, C. & Ben Sujitha, B. Blockchain based access control and data sharing systems for smart devices. J. Phys: Conf. Ser.1767, 012056. 10.1088/1742-6596/1767/1/012056 (2021). [Google Scholar]
  • 2.Chinnasamy, P. et al. Blockchain 6g-based wireless network security management with optimization using machine learning techniques. Sensors24, 256. 10.3390/s24186143 (2024). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 3.Chinnasamy, P. et al. Blockchain based electronic educational document management with role-based access control using machine learning model. Sci. Rep.15, 18828. 10.1038/s41598-025-99683-5 (2025). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Li, T., Sahu, A. K., Talwalkar, A. & Smith, V. Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag.37, 50–60. 10.1109/msp.2020.2975749 (2020). [Google Scholar]
  • 5.Fang, L., Wang, L. & Li, H. Iterative and mixed-spaces image gradient inversion attack in federated learning. Cybersecurity7, 35. 10.1186/s42400-024-00227-7 (2024). [Google Scholar]
  • 6.Sharma, P. K., Moon, S. Y. & Park, J. H. Block-vn: a distributed blockchain based vehicular network architecture in smart city. J. Inf. Process. Syst.13, 184–195 (2017). [Google Scholar]
  • 7.Kilian, J. & Petrank, E. Identity escrow. Cryptology ePrint Archive, Report 1997/011 (1997).
  • 8.Xia, G., Chen, J., Yu, C. & Ma, J. Poisoning attacks in federated learning: A survey. IEEE Access11, 10708–10722. 10.1109/ACCESS.2023.3238823 (2023). [Google Scholar]
  • 9.Huang, C., Wang, B., Bao, Z. & Qi, W. 2faka-c/s: a robust two-factor authentication and key agreement protocol for c/s data transmission in federated learning. Appl. Sci.14, 6664. 10.3390/app14156664 (2024). [Google Scholar]
  • 10.Fan, M. et al. Blockchain-based decentralized and lightweight anonymous authentication for federated learning. IEEE Trans. Veh. Technol.72, 12075–12086. 10.1109/TVT.2023.3265366 (2023). [Google Scholar]
  • 11.Rehman, S. U. et al. Comparison based analysis of different cryptographic and encryption techniques using message authentication code (mac) in wireless sensor networks (wsn) (2012). arXiv:1203.3103.
  • 12.Dwivedi, S. K., Amin, R., Vollala, S. & Das, A. K. Design of blockchain and ecc-based robust and efficient batch authentication protocol for vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst.25, 275–288. 10.1109/TITS.2023.3310514 (2024). [Google Scholar]
  • 13.Manvi, S. S., Kakkasageri, M. S. & Adiga, D. G. Message authentication in vehicular ad hoc networks: Ecdsa based approach. Int. Conf. Future Comput. Commun.2009, 16–20 (2009). [Google Scholar]
  • 14.Maity, S. & Hansdah, R. Membership models and the design of authentication protocols for manets. In Int. Conf. Adv. Inf. Netw. Appl. Workshops 544–551 (2012). 10.1109/WAINA.2012.107.
  • 15.Parameswarath, R. P., Gope, P. & Sikdar, B. User-empowered privacy-preserving authentication protocol for electric vehicle charging based on decentralized identity and verifiable credential. ACM Trans. Manage. Inf. Syst.13, 256. 10.1145/3532869 (2022). [Google Scholar]
  • 16.Camenisch, J. & Lysyanskaya, A. Dynamic accumulators and application to efficient revocation of anonymous credentials. Adv. Cryptol. CRYPTO.2442, 61–76. 10.1007/3-540-45708-9_5 (2002). [Google Scholar]
  • 17.Xia, Y. et al. Teva: Training-efficient and verifiable aggregation for federated learning for consumer electronics in industry 5.0. IEEE Trans. Consum. Electron.71, 4248–4264. 10.1109/TCE.2024.3517739 (2025). [Google Scholar]
  • 18.Zhang, R., Xiao, Y., Sun, S. & Ma, H. Efficient multi-factor authenticated key exchange scheme for mobile communications. IEEE Trans. Dependable Secure Comput.16, 625–634 (2019). [Google Scholar]
  • 19.Siddiqui, Z., Gao, J. & Khurram Khan, M. An improved lightweight puf-pki digital certificate authentication scheme for the internet of things. IEEE Internet Things J.9, 19744–19756. 10.1109/JIOT.2022.3168726 (2022). [Google Scholar]
  • 20.Azees, M., Vijayakumar, P. & Deboarh, L. J. Eaap: efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst.18, 2467–2476 (2017). [Google Scholar]
  • 21.Vijayakumar, P., Chang, V., Deborah, L., Balamurugan, B. & Shynu, P. G. Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst.78, 658 (2016). [Google Scholar]
  • 22.Wang, J., Wu, L., Choo, K.-K.R. & He, D. Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure. IEEE Trans. Ind. Informat.16, 1984–1992 (2020). [Google Scholar]
  • 23.Chen, Z. & Wu, S. Digital identity authentication using blockchain. J. Phys. Conf. Ser.2021, 1802. 10.1088/1742-6596/1802/3/032091 (2021). [Google Scholar]
  • 24.Xu, W. et al. Towards efficient verifiable multi-keyword search over encrypted data based on blockchain. PeerJ Comput. Sci.2022, 930. 10.7717/peerj-cs.930 (2022). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 25.Xu, W., Zhu, Z. & Khalid, M. I. Efficient phrase search with reliable verification over encrypted cloud-iot data. PeerJ Comput. Sci.10, 2235. 10.7717/peerj-cs.2235 (2024). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 26.Lux, Z., Thatmann, D., Zickau, S. & Beierle, F. Dlt-based authentication with decentralized identifiers. In 2020 2nd Conf. on Blockchain Research & Applications (BRAINS) 71–78 (2020). 10.1109/BRAINS49436.2020.9223292.
  • 27.Khalid, M. I., Ahmed, M. & Kim, J. Enhancing data protection in dynamic consent management systems: Formalizing privacy and security definitions with differential privacy, decentralization, and zero-knowledge proofs. Sensors23, 7604. 10.3390/s23177604 (2023). [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 28.Jueneman, R., Matyas, S. & Meyer, C. Message authentication. IEEE Commun. Mag.23, 29–40. 10.1109/MCOM.1985.1092643 (1985). [Google Scholar]
  • 29.Lu, Y. et al. Two-way authentication for decentralized identities. In 2022 14th Int. Conf. on Mechatronics Automation (ICMTMA) 861–865 (2022). 10.1109/icmtma54903.2022.00175.
  • 30.Anada, H. Multi-authority anonymous authentication using digital signatures. In 2019 IEEE Int. Conf. on Smart Computing (SMARTCOMP) 25–32 (2019). 10.1109/SMARTCOMP.2019.00024.
  • 31.Lai, J., Wang, T., Zhang, S., Yang, Q. & Liew, S. Biozero: privacy-preserving biometric authentication on blockchain. ArXivabs/2409.17509. 10.48550/arXiv.2409.17509 (2024).
  • 32.Xu, L. et al. Diota: Dlt-based data authenticity in iot. IEEE Netw.34, 38–46. 10.1109/MNET.001.1900136 (2020). [Google Scholar]
  • 33.Benaloh, J. & de Mare, M. One-way accumulators: a decentralized alternative to digital signatures (extended abstract). In Int. Conf. Theory Appl. Cryptogr. Tech. (1994).
  • 34.Boneh, D., Bünz, B. & Fisch, B. Batching techniques for accumulators with applications to iops and stateless blockchains. In Advances in Cryptology – CRYPTO 2019 (eds. Boldyreva, A. & Micciancio, D.) 561–586 (Springer International Publishing, 2019).
  • 35.LaMacchia, B., Lauter, K. & Mityagin, A. Stronger security of authenticated key exchange. Cryptology ePrint Archive, Paper 2006/073 (2006).
  • 36.Dolev, D. & Yao, A. C. On the security of public key protocols. IEEE Trans. Inf. Theory29, 198–208 (1983). [Google Scholar]
  • 37.Xia, Y., Liu, Y., Dong, S., Li, M. & Guo, C. Svca: Secure and verifiable chained aggregation for privacy-preserving federated learning. IEEE Internet Things J.11, 18351–18365. 10.1109/JIOT.2024.3363712 (2024). [Google Scholar]
  • 38.Raz, D., Shavitt, Y. & Zhang, L. Distributed council election. IEEE/ACM Trans. Netw12, 483–492. 10.1109/TNET.2004.828945 (2004). [Google Scholar]
  • 39.Du, M., Chen, Q. & Ma, X. Mbft: a new consensus algorithm for consortium blockchain. IEEE Access8, 87665–87675. 10.1109/ACCESS.2020.2993759 (2020). [Google Scholar]
  • 40.Khalid, M. I. et al. A comprehensive survey on blockchain-based decentralized storage networks. IEEE Access10.1109/ACCESS.2023.3240237 (2023). [Google Scholar]
  • 41.Challarapu, N. & Chivukula, S. Elliptic curve cryptography applied for (k, n) threshold secret sharing scheme. ECS Trans.107, 1021. 10.1149/10701.1021ecst (2022). [Google Scholar]
  • 42.Koblitz, N. Elliptic curve cryptosystems. Math. Comput.48, 203–209. 10.1090/S0025-5718-1987-0866109-5 (1987). [Google Scholar]
  • 43.Wang, D. & Wang, P. Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput.15, 708–722. 10.1109/TDSC.2016.2605087 (2018). [Google Scholar]
  • 44.Wang, C. & Xu, G. Cryptanalysis of three password-based remote user authentication schemes with non-tamper-resistant smart card. Secur. Commun. Netw.2017, 1619741 (2017). [Google Scholar]
  • 45.Wang, F., Xu, G. & Xu, G. A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map. IEEE Access7, 101596–101608 (2019). [Google Scholar]
  • 46.He, D., Zhao, Z., Chan, S. & Guizani, M. A novel authentication protocol for iot-enabled devices. IEEE Internet Things J.10, 867–876. 10.1109/JIOT.2022.3204410 (2023). [Google Scholar]
  • 47.Srinivas, J., Das, A. K., Wazid, M. & Vasilakos, A. V. Designing secure user authentication protocol for big data collection in iot-based intelligent transportation system. IEEE Internet Things J.8, 7727–7744. 10.1109/JIOT.2020.3040938 (2021). [Google Scholar]
  • 48.Wang, Q. & Wang, D. Understanding failures in security proofs of multi-factor authentication for mobile devices. IEEE Trans. Inf. Forensics Secur.18, 597–612. 10.1109/TIFS.2022.3227753 (2022). [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

No datasets were generated or analysed during the current study.


Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES