Secure Blockchain-Based Supply Chain Management with Verifiable Digital Twins
@article{Botta2021SecureBS, title={Secure Blockchain-Based Supply Chain Management with Verifiable Digital Twins}, author={Vincenzo Botta and Laura Fusco and Attilio Mondelli and Ivan Visconti}, journal={ArXiv}, year={2021}, volume={abs/2109.03870} }
A major problem in blockchain-based supply chain management is the unclear validity of digital twins when dealing with digital representations of physical goods. Indeed, the use of blockchain technology to trace goods is ineffective if there is no strong correspondence between what is physically exchanged and the digital information that appears in blockchain transactions. In this work we propose a model for strengthening the supply chain management of physical goods leveraging blockchain…
One Citation
Can a Byte Improve Our Bite? An Analysis of Digital Twins in the Food Industry
- Computer ScienceSensors
- 2021
An overview of digital twin applications in the food industry is provided and key elements to implement digital twins are identified and key potentials are discussed.
References
SHOWING 1-10 OF 12 REFERENCES
Blockchain-Based Product Traceability Beyond Proof of Existence
- Computer Science, Business2020 Moratuwa Engineering Research Conference (MERCon)
- 2020
This work proposes a solution where data related to enforcement of product-quality specifications and production limits, merging and splitting products as batches, and mixing of ingredients are handled within the block-chain itself to provide greater consistency, transparency, and trust.
Privacy-preserving auditable token payments in a permissioned blockchain system
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2019
This work presents a privacy-preserving token management system for permissioned blockchains that also supports fine-grained auditing, and provides performance measurements for the prototype built on top of Hyperledger Fabric.
Hyperledger fabric: a distributed operating system for permissioned blockchains
- Computer ScienceEuroSys
- 2018
This paper describes Fabric, its architecture, the rationale behind various design decisions, its most prominent implementation aspects, as well as its distributed application programming model, and shows that Fabric achieves end-to-end throughput of more than 3500 transactions per second in certain popular deployment configurations.
An agri-food supply chain traceability system for China based on RFID & blockchain technology
- Business2016 13th International Conference on Service Systems and Service Management (ICSSSM)
- 2016
RFID and blockchain technology can realize the traceability with trusted information in the entire agri-food supply chain, which would effectively guarantee the food safety, by gathering, transferring and sharing the authentic data of agre-food in production, processing, warehousing, distribution and selling links.
Blockchain Technologies: The Foreseeable Impact on Society and Industry
- Computer ScienceComputer
- 2017
The authors describe blockchain’s fundamental concepts, provide perspectives on its challenges and opportunities, and trace its origins from the Bitcoin digital cash system to recent applications.
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Computer Science, MathematicsEUROCRYPT
- 2007
A new setup assumption is proposed -- more along the lines of a physical assumption regarding the existence of tamper-proof hardware -- which also suffices to circumvent the impossibility result mentioned above.
Smart Agri-Food Logistics: Requirements for the Future Internet
- BusinessLDIC
- 2012
This paper defines requirements on Future Internet technologies that have to be met to accomplish the specific challenges of agri-food logistics and identifies a set of generic technical enablers as input for the realisation of a FI core platform.
How to play any mental game, or a completeness theorem for protocols with honest majority
- Computer ScienceProviding Sound Foundations for Cryptography
- 2019
Permission to copy without fee all or part of this material is granted provided that the copies are not made or Idistributed for direct commercial advantage, the ACM copyright notice and the title of…
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Computer Science, MathematicsSIAM J. Comput.
- 1988
A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.
Universally composable security: a new paradigm for cryptographic protocols
- Computer Science, MathematicsProceedings 2001 IEEE International Conference on Cluster Computing
- 2001
It is shown how to formulate universally composable definitions of security for practically any cryptographic task, and it is demonstrated that practically any such definition can be realized using known techniques, as long as only a minority of the participants are corrupted.