Abstract
Most password managers are designed as a compromise between providing a secure way to handle difficult login credentials and creating a system that keeps user information private. Most password managers store users’ sensitive information in a central location, leaving users vulnerable to hacking attacks. The proposed work creates a better way to manage passwords and provide more protection to users based on their private information through a new concept called Guardian-Anonymous Password Management (GAPM). The idea is to create a unique architecture that stores passwords in decentralized locations using guardian anonymity, creating a hybrid architecture of secret sharing with post-quantum encrypted wraps. Accordingly, GAPM separates the act of recovering user passwords from a person, using a set of anonymous guardians who securely recover users’ passwords without putting any of them at risk of being hacked or located through social engineering techniques like phishing. This is achieved by using a Shamir-style secret sharing scheme combined with verifiably reassured commitments, where none of the guardians know each other, and they are required to reach a certain threshold of agreement to combine their shares into an easily accessible password recovery key. The GAPM system supports multiple guardian sets, allowing participants to be added or removed, and there is no need to reissue all the shares each time users make a change. The user can also change the recovery threshold in real-time. Finally, the shares are further secured through the use of a post-quantum Key Encapsulation Mechanism (KEM) to ensure that, no matter what kind of attack (classical or quantum), the password recovery process will remain strong and secure.
References
- Murcia, José Manuel Bernabé, Eduardo Cánovas, Jesús García-Rodríguez, Alejandro M. Zarca, and Antonio Skarmeta. "Decentralised Identity Management Solution for Zero-Trust Multi-Domain Computing Continuum Frameworks." Future Generation Computer Systems 162 (2025): 107479.
- Xiong, Hengheng, Jiguang Lv, Dapeng Man, Yukun Zhu, Tao Liu, Huanran Wang, Chen Xu, and Wu Yang. "A Lightweight Secret-Sharing-Based Defense Against Model Poisoning Attacks in Privacy-Preserving Federated Learning." Computer Communications (2025): 108272.
- Chen, Jiahui, Hang Xiao, Yushan Zheng, Mohammad Mehedi Hassan, Michele Ianni, Antonella Guzzo, and Giancarlo Fortino. "DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things." Internet of Things 23 (2023): 100871.
- Umoren, Otuekong, Amjad Ali, Zeeshan Pervez, Farman Ali, Raman Singh, Keshav Dahal, and Ala Al-Fuqaha. "Enhancing User Verification and Data Security Scheme for Fog Computing Using Self Sovereign Identification." Ad Hoc Networks 175 (2025): 103876.
- Miao, Miao, Zhengjun Jing, Xiaolong Xu, and Meiqing Xue. "A Decentralized and Security-Enhanced Professional Title Evaluation System in Universities Under Mobile Internet of Things." Heliyon 10, no. 5 (2024).
- Agarkar, Aarti Amod, Mandar Karyakarte, Gajanan Chavhan, Milind Patil, Rajendra Talware, and Lalit Kulkarni. "Blockchain Aware Decentralized Identity Management and Access Control System." Measurement: Sensors 31 (2024): 101032.
- Tatipatri, Naveen, and S. L. Arun. "A Privacy-Preserving Based Cyber Security for Communication Attacks in Active Power Distribution Networks." International Journal of Electrical Power & Energy Systems 172 (2025): 111243.
- Yu, Hao, Guijuan Wang, Anming Dong, Yubing Han, Yawei Wang, and Jiguo Yu. "Blockchain-Enabled Privacy Protection Scheme for IoT Digital Identity Management." High-Confidence Computing (2025): 100320.
- Das, Swatisipra, Minati Mishra, Rojalina Priyadarshini, Rabindra Kumar Barik, and Manob Jyoti Saikia. "A Secure, Privacy-Preserving, and Cost-Efficient Decentralized Cloud Storage Framework Using Blockchain." Journal of King Saud University-Computer and Information Sciences 36, no. 10 (2024): 102260.
- Shaw, Surbhi, and Ratna Dutta. "Post-Quantum Secure Compact Deterministic Wallets from Isogeny-Based Signatures with Rerandomized Keys." Theoretical Computer Science 1035 (2025): 115127.
- Park, Kisung, and Youngho Park. "MIoT-CDPS: Complete Decentralized Privacy-Preserving Scheme for Medical Internet of Things." Internet of Things 27 (2024): 101250.
- Daudén-Esmel, Cristòfol, Jordi Castellà-Roca, Alexandre Viejo, and Ignacio Miguel-Rodríguez. "Multi-Platform Wallet for Privacy Protection and Key Recovery in Decentralized Applications." Blockchain: Research and Applications 6, no. 1 (2025): 100243.
- Erinle, Yimika, Yathin Kethepalli, Yebo Feng, and Jiahua Xu. "SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets." Computer Networks (2025): 111691.
- Athanere, Smita, and Ramesh Thakur. "Blockchain Based Hierarchical Semi-Decentralized Approach Using IPFS for Secure and Efficient Data Sharing." Journal of King Saud University-Computer and Information Sciences 34, no. 4 (2022): 1523-1534.
- Ma, Emilie, and Martin Kleppmann. "Kintsugi: Decentralized E2EE Key Recovery." arXiv preprint arXiv:2507.21122 (2025).
- Kamal, Ahmad Akmal Aminuddin Mohd, and Masaya Fujisawa. "Efficient and Secure Secret Sharing-Based Data Outsourcing Suitable for Internet of Things Environments." Internet of Things 32 (2025): 101645.
- Hussein, Asma, Abeer Maolood, and Ekhlas Gbashi. "NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing." Computers, Materials, & Continua 76, no. 1 (2023): 753.
- Gutub, Adnan. "Adjusting Counting-Based Secret-Sharing via Personalized Passwords and Email-Authentic Reliability." Journal of Engineering Research 12, no. 1 (2024): 107-121.
- Wijesundara, W. M. A. B., Joong-Sun Lee, Eleni Aloupogianni, Dara Tith, Hiroyuki Suzuki, and Takashi Obi. "DIDAuth-IoTFW: Decentralized Firmware Authentication for Smart Home IoT Devices Using Verifiable Credentials." Internet of Things (2025): 101788.
- Chatzoglou, Efstratios, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, and Georgios Kambourakis. "Unmasking the Hidden Credential Leaks in Password Managers and VPN Clients." Computers & Security 150 (2025): 104298.
- Johnson Jeyakumar, Isaac Henderson, and Michael Kubach. "A Trust Implementation Model for Cross-Domain Decentralized Identity Ecosystems." Procedia computer science 254 (2025).
- Lee, Sun-Jin, So-Eun Jeon, and Il-Gu Lee. "Partial Encryption-Based Shamir Secret Sharing for Low-Latency and Secure Networks." ICT Express (2025).
- de Diego, Santiago, Cristina Regueiro, and Gabriel Maciá-Fernández. "Collaborative Credentials for the Internet of Things." Computer Networks 251 (2024): 110629.
- Okacha Amraouy and Mohammed Benbrahim and Mohammed Nabil Kabbaj. “A Blockchain- and Self-Sovereign Identity-Based Collaborative Framework for Secure and Verifiable Cross-Organizational Data Sharing in Smart Irrigation”. Smart Agricultural Technology 12, 101654.
- Kim, Taehoon, Dahee Seo, Im-Yeong Lee, and Su-Hyun Kim. "A Novel Approach to Privacy and Traceability Using Attribute-Based Signature in Decentralized Identifier." High-Confidence Computing (2025): 100326.
- Anttal, T. S. (2020). Bruteforce Database - Password Dictionaries. Kaggle. https://www.kaggle.com/datasets/taranvee/bruteforce-database-password-dictionaries

Journal of Trends in Computer Science and Smart Technology