Data breaches, identity theft, unauthorized access, and many other cyber threats are common issues in traditional identity management systems. One major cause of this challenge is the centralized repository used for storing, managing, and controlling...