Efficient Multi-Layer Credential Revocation Scheme for 6G Using Dynamic RSA Accumulators and Blockchain
Abstract
1. Introduction
- Firstly, we discuss a reasonable identity revocation state update mechanism in 6G scenarios and analyze the defects of a single RSA accumulator scheme. Subsequently, based on the analysis results, we propose an identity credential revocation and revocation checking scheme in 6G scenarios. The architecture of this scheme consists of four layers: a rapid pre-filtration layer, a directed routing layer, a precision judgement layer, and a trustworthy storage layer.
- Secondly, we elaborate, in detail, on the core responsibilities and implementation scheme of each layer in the four-layer architecture. In the first rapid pre-filtration layer, we adopt the cuckoo filter technology, which takes the credentials as the elements in the cuckoo filter and can achieve rapid judgment regarding whether a credential has not completed revocation, which cuts down a part of the revocation checking request and effectively reduces the pressure on the system. In the second and third layers of the directed routing layer and precision judgment layer, we propose a dynamic expansion and load-balancing algorithm based on the consistency hash and RSA accumulator, which dynamically adds or deletes the RSA accumulator according to the actual number of revocation credentials, which can achieve smaller and more stable revocation checking delay. In the fourth trusted storage layer, we adopt blockchain technology as the trusted storage medium for the revocation of important parameters in 6G scenarios to achieve a tamper-proof revocation mechanism and trusted data traceability.
- Finally, based on the above-proposed scheme, we further propose the Identity Credential Revocation and Verification Process, which divides credential revocation into active credential revocation and passive credential revocation, and propose corresponding revocation processes for different mechanisms.
2. Review of Related Work
3. BCMRA Scheme Architecture
- Immediate update: When a member is added or removed from the RSA accumulator, the system immediately computes and generates new member proofs for the other members in the RSA accumulator, with a time complexity of . The time complexity of other member proofs is .
- Update on verification: when members are added or removed from the RSA accumulator, the system does not update the membership proofs of other members in real-time. When other members perform authentication operations, they need to check the revocation information, and the system updates the member’s proof separately under this moment, with a time complexity of .
4. BCMRA Scheme-Specific Implementation
4.1. Rapid Pre-Filtration Layer Based on Cuckoo Filter
4.2. Directed Routing Layer Based on Consistent Hashing
- Define the hash space: The length of the hash value is 256 bits, and the corresponding hash space ranges from , forming a logical closed-loop space.
- Deploying virtual nodes: Each RSA accumulator corresponds to V virtual nodes ; the virtual node hash value is calculated as , where is the virtual node replica serial number, with a range of .
- Build the hash ring: Sort the hash values of all virtual nodes to form a consistent hash ring; each virtual node corresponds to the interval on the ring, where is the virtual node’s own hash value and is the hash of the next virtual node after sorting.
- Locating a virtual node: Calculate the hash value of the identifier of the credential to be revoked, get the position of in the consistency hash ring, and, from that position, start to look up along the consistency hash ring in the clockwise direction and find the first virtual node where a hash value greater than . is satisfied:
- Mapping the RSA accumulator: Locate the virtual node ; the physical node corresponding to this virtual node is the target RSA accumulator. The physical node, represented by an RSA accumulator, corresponds to multiple virtual nodes. By increasing the number of virtual nodes, the virtual nodes can be distributed more evenly over the consistency hash ring, thus allowing for the credential identifier to be revoked to be distributed more evenly across the RSA accumulators. However, the greater the number of virtual nodes, the greater the burden on the system, so the number of virtual nodes should be selected according to the actual situation.
4.3. Precision Judgment Layer Based on a Multiple-RSA Accumulator
- Add a new RSA accumulator: As shown in Algorithm 1, when the number of revocation credentials stored in any one RSA accumulator exceeds the load maximum threshold , trigger the operation of adding a new RSA accumulator, add a new RSA accumulator with the same initialization parameters, generate the corresponding virtual node, and insert it into the consistency hash ring. Starting from the position of the added RSA accumulator on the hash ring, the next RSA accumulator is found in a clockwise direction, and the revocation credentials between these two RSA accumulators are migrated to the added RSA accumulator.
- Reduce RSA accumulators: As shown in Algorithm 1, when the number of revocation credentials stored in any of the RSA accumulators falls below the load minimum threshold , trigger a reduced RSA accumulator operation. Remove all virtual nodes of that RSA accumulator from the consistency hash ring; subsequently, find all credentials originally mapped to that RSA accumulator, recalculate the hash values of those credentials, and map them to the new RSA accumulator.
Algorithm 1 Dynamic Expansion and Load-Balancing |
|
4.4. Trusted Storage Layer Based on Blockchain
5. Identity Credential Revocation and Verification Process Based on BCMRA Scheme
5.1. Identity Credential Revocation Process
- Active credential revocation: The user submits an application for identity credential revocation independently.
- Passive credential revocation: The user’s identity credentials expire or the user commits a malicious act resulting in a decrease in the integrated trust value, and the system detects that the user’s integrated trust value is lower than the minimum tolerance limit of the trust domain.
- User A initiates an unsolicited revocation of credential request to an authenticator within the same trust domain containing the user’s identifier and the credential identifier , encrypted by the authenticator’s public key.
- The authenticator receives the unsolicited revocation of credential request from user A and verifies the legitimacy of the request using the private key.
- The authenticator parses the user’s identity and credential information from the request and verifies the legitimacy of user A in the blockchain within the same trust domain.
- After the request of user A in step 1, the identity information in step 2, and the credential information in step 3 are verified, the verifier sends the credential identifier of user A to the cuckoo filter in the fast pre-filtering layer.
- The cuckoo filter performs an insert element operation to calculate the fingerprint and candidate bucket position of and insert it into the corresponding slot.
- In order to avoid a revocation credential validation misjudgment, , is further sent to the directed routing layer.
- The target RSA accumulator number is computed in the directed routing layer by means of a consistent hash algorithm.
- Based on the calculated target RSA accumulator number, the is further sent to the precision judgement layer.
- An insert element operation is performed by the RSA accumulator in the precision judgement layer to generate the latest accumulated value.
- The blockchain node in the trusted storage layer writes the latest cumulative value of the RSA accumulator into the blockchain network in the form of a smart contract transaction to complete the credential revocation operation of user A.
- The blockchain node returns the credential revocation result to the client of user A.
- After user B within trust domain X commits a malicious act, a member of the trust management committee from trust domain X checks whether the composite trust value of user B is lower than the minimum trust threshold of trust domain X, and then applies to the trust management blockchain node to query and calculate the composite trust value of user B.
- The trust management blockchain node calculates the composite trust value by means of a node trust assessment scheme based on the identity identifier of user B and the trust domain identifier in which user B is located.
- The trust management blockchain node sends the integrated trust value of user B to the members of the trust management committee.
- The member of the trust management committee determines whether the credentials of user B need to be revoked based on the returned composite trust value, and if the result of the determination is that passive revocation of the credentials needs to be performed on user B, it continues to execute the BCMRA scheme of Steps 5–12 and completes the process of revoking the credentials of the user B.
5.2. Verification Process for Revoked Credentials
- The validator first performs a quick validation operation, calling the query element interface of the cuckoo filter.
- The cuckoo filter performs a query element operation with input parameter to be verified and outputs the query result as either exists or does not exist.
- If the validator receives a validation result of does not exist, the validation process ends with the result that the credential to be validated has not been revoked. If the validation result received is that exists, the subsequent steps continue.
- The validator sends a request for exact validation to the blockchain node within the same trust domain with and is encrypted by the validator’s private key.
- The blockchain node verifies the legitimacy of the request via the authenticator’s public key and subsequently computes the number of the target RSA accumulator via a consistent hash algorithm.
- The blockchain node queries the latest accumulation value of the target RSA accumulator via the number of the accumulator, generates the latest proof of membership , and sends the latest accumulation value and the proof of membership to the verifier.
- The validator verifies the validity of the latest membership proof through the validation parameters returned by the blockchain node and finally completes the entire process of verifying whether the user credentials have been revoked.
6. Experimental Results
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
V2X | Vehicle to Everything |
CAVs | connected and automated vehicles |
6G | 6th Generation Mobile Networks |
IDS | Intrusion Detection Systems |
EMI | Electromagnetic Interference |
MIMO | Multi-input Multi-output |
OCSP | Online Certificate Status Protocol |
CRL | Certificate Revocation List |
CA | Certificate Authorities |
VA | Verification Authorities |
RSA | Rivest-Shamir-Adleman |
BCMRA | Blockchain, Cuckoo Filter, Multi-RSA Accumulator |
References
- Ju, Y.; Gao, Z.; Wang, H.; Liu, L.; Pei, Q.; Dong, M.; Mumtaz, S.; Leung, V.C. Energy-efficient cooperative secure communications in mmwave vehicular networks using deep recurrent reinforcement learning. IEEE Trans. Intell. Transp. Syst. 2024, 25, 14460–14475. [Google Scholar] [CrossRef]
- Dong, H.; Hu, Q.; Li, D.; Li, Z.; Song, Z. Predictive battery thermal and energy management for connected and automated electric vehicles. IEEE Trans. Intell. Transp. Syst. 2025, 26, 2144–2156. [Google Scholar] [CrossRef]
- Hakeem, S.A.A.; Kim, H. Advancing Intrusion Detection in V2X Networks: A Comprehensive Survey on Machine Learning, Federated Learning, and Edge AI for V2X Security. IEEE Trans. Intell. Transp. Syst. 2025. [Google Scholar] [CrossRef]
- Gangwar, D.; Malik, J.; Patnaik, A. Harmonic suppressed MIMO antenna for highly integrated V2X communication system. IEEE Lett. Electromagn. Compat. Pract. Appl. 2024, 7, 19–24. [Google Scholar] [CrossRef]
- Alhashimi, H.F.; Hindia, M.N.; Dimyati, K.; Hanafi, E.B.; Safie, N.; Qamar, F.; Azrin, K.; Nguyen, Q.N. A survey on resource management for 6G heterogeneous networks: Current research, future trends, and challenges. Electronics 2023, 12, 647. [Google Scholar] [CrossRef]
- Ju, Y.; Cao, Z.; Chen, Y.; Liu, L.; Pei, Q.; Mumtaz, S.; Dong, M.; Guizani, M. NOMA-Assisted Secure Offloading for Vehicular Edge Computing Networks with Asynchronous Deep Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 2023, 25, 2627–2640. [Google Scholar] [CrossRef]
- George, A.; Murthy, G.R. (Eds.) Towards Wireless Heterogeneity in 6G Networks; CRC Press: Boca Raton, FL, USA, 2024. [Google Scholar]
- Ju, Y.; Song, J.; Li, W.; Zhang, Y.; He, C.; Dong, F.; Chen, C. Dynamic Load-Balancing Routing Strategy for LEO Satellite Networks Based on Spatio-Temporal Traffic Prediction. IEEE Trans. Aerosp. Electron. Syst. 2025. [Google Scholar] [CrossRef]
- Kazmi, S.H.A.; Hassan, R.; Qamar, F.; Nisar, K.; Ibrahim, A.A.A. Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions. Symmetry 2023, 15, 1147. [Google Scholar] [CrossRef]
- Jain, G. Certificate Revocation: A Survey. Citeseer. 2000. Available online: https://www.researchgate.net/publication/2498488_Certificate_Revocation_A_Survey (accessed on 27 July 2025).
- Ozcelik, I.; Skjellum, A. Cryptorevocate: A cryptographic accumulator based distributed certificate revocation list. In Proceedings of the 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Virtual, 27–30 January 2021; pp. 561–570. [Google Scholar]
- Naor, M.; Nissim, K. Certificate revocation and certificate update. IEEE J. Sel. Areas Commun. 2000, 18, 561–570. [Google Scholar] [CrossRef]
- Cooper, D.A. A More Efficient Use of Delta-CRLs. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 14–17 May 2000. [Google Scholar]
- Kikuchi, H.; Abe, K.; Nakanishi, S. Performance evaluation of public-key certificate revocation system with balanced hash tree. In Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing (CMC’99). Group Communications (IWGC). Internet’99 (IWI’99). Industrial Applications on Network Computing (INDAP), Aizu-Wakamatsu, Japan, 24 September 1999; pp. 204–209. [Google Scholar]
- Wang, S.; Du, X.; Yang, Z. Distributed key revocation scheme based on shared binary tree. In Proceedings of the 2015 IEEE International Conference on Progress in Informatics and Computing (PIC), Nanjing, China, 18–20 December 2015; pp. 338–342. [Google Scholar]
- Annavajjala, R.M.; Anand, V. Partition based hash tree—An efficient certificate revocation system. In Proceedings of the 2017 IEEE International Conference on Electro Information Technology (EIT), Lincoln, NE, USA, 14–17 May 2017; pp. 551–556. [Google Scholar]
- Berbecaru, D.; Lioy, A.; Marian, M. Security aspects in standard certificate revocation mechanisms: A case study for OCSP. In Proceedings of the ISCC 2002 Seventh International Symposium on Computers and Communications, Taormina-Giardini Naxos, Italy, 1–4 July 2002; pp. 484–489. [Google Scholar]
- Camenisch, J.; Lysyanskaya, A. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
- Fueyo, M.; Herranz, J. On the efficiency of revocation in RSA-based anonymous systems. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1771–1779. [Google Scholar] [CrossRef]
- Wang, Z.; Lin, J.; Cai, Q.; Wang, Q.; Zha, D.; Jing, J. Blockchain-based Certificate Transparency and Revocation Transparency. IEEE Trans. Dependable Secur. Comput. 2020, 19, 681–697. [Google Scholar] [CrossRef]
- Adja, Y.C.E.; Hammi, B.; Serhrouchni, A.; Zeadally, S. A Blockchain-based Certificate Revocation Management and Status Verification System. Comput. Secur. 2021, 104, 102209. [Google Scholar] [CrossRef]
- Zhang, H.; Chen, Y.; Ren, W.; Li, T. CertRV: An Efficient Certificate Revocation Scheme via Consortium Blockchain, Chameleon Hash and Cuckoo Filter. In Proceedings of the 2024 IEEE International Conference on Web Services (ICWS), Shenzhen, China, 7–13 July 2024; Volume 10, pp. 1338–1340. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, G.; Zou, Y.; Zhou, J.; Cui, H.; Ju, Y. Efficient Multi-Layer Credential Revocation Scheme for 6G Using Dynamic RSA Accumulators and Blockchain. Electronics 2025, 14, 3066. https://doi.org/10.3390/electronics14153066
Wang G, Zou Y, Zhou J, Cui H, Ju Y. Efficient Multi-Layer Credential Revocation Scheme for 6G Using Dynamic RSA Accumulators and Blockchain. Electronics. 2025; 14(15):3066. https://doi.org/10.3390/electronics14153066
Chicago/Turabian StyleWang, Guangchao, Yanlong Zou, Jizhe Zhou, Houxiao Cui, and Ying Ju. 2025. "Efficient Multi-Layer Credential Revocation Scheme for 6G Using Dynamic RSA Accumulators and Blockchain" Electronics 14, no. 15: 3066. https://doi.org/10.3390/electronics14153066
APA StyleWang, G., Zou, Y., Zhou, J., Cui, H., & Ju, Y. (2025). Efficient Multi-Layer Credential Revocation Scheme for 6G Using Dynamic RSA Accumulators and Blockchain. Electronics, 14(15), 3066. https://doi.org/10.3390/electronics14153066