• Corpus ID: 237454616

Secure Blockchain-Based Supply Chain Management with Verifiable Digital Twins

  title={Secure Blockchain-Based Supply Chain Management with Verifiable Digital Twins},
  author={Vincenzo Botta and Laura Fusco and Attilio Mondelli and Ivan Visconti},
A major problem in blockchain-based supply chain management is the unclear validity of digital twins when dealing with digital representations of physical goods. Indeed, the use of blockchain technology to trace goods is ineffective if there is no strong correspondence between what is physically exchanged and the digital information that appears in blockchain transactions. In this work we propose a model for strengthening the supply chain management of physical goods leveraging blockchain… 
1 Citations

Can a Byte Improve Our Bite? An Analysis of Digital Twins in the Food Industry

An overview of digital twin applications in the food industry is provided and key elements to implement digital twins are identified and key potentials are discussed.



Blockchain-Based Product Traceability Beyond Proof of Existence

This work proposes a solution where data related to enforcement of product-quality specifications and production limits, merging and splitting products as batches, and mixing of ingredients are handled within the block-chain itself to provide greater consistency, transparency, and trust.

Privacy-preserving auditable token payments in a permissioned blockchain system

This work presents a privacy-preserving token management system for permissioned blockchains that also supports fine-grained auditing, and provides performance measurements for the prototype built on top of Hyperledger Fabric.

Hyperledger fabric: a distributed operating system for permissioned blockchains

This paper describes Fabric, its architecture, the rationale behind various design decisions, its most prominent implementation aspects, as well as its distributed application programming model, and shows that Fabric achieves end-to-end throughput of more than 3500 transactions per second in certain popular deployment configurations.

An agri-food supply chain traceability system for China based on RFID & blockchain technology

  • Feng Tian
  • Business
    2016 13th International Conference on Service Systems and Service Management (ICSSSM)
  • 2016
RFID and blockchain technology can realize the traceability with trusted information in the entire agri-food supply chain, which would effectively guarantee the food safety, by gathering, transferring and sharing the authentic data of agre-food in production, processing, warehousing, distribution and selling links.

Blockchain Technologies: The Foreseeable Impact on Society and Industry

The authors describe blockchain’s fundamental concepts, provide perspectives on its challenges and opportunities, and trace its origins from the Bitcoin digital cash system to recent applications.

Universally Composable Multi-party Computation Using Tamper-Proof Hardware

A new setup assumption is proposed -- more along the lines of a physical assumption regarding the existence of tamper-proof hardware -- which also suffices to circumvent the impossibility result mentioned above.

Smart Agri-Food Logistics: Requirements for the Future Internet

This paper defines requirements on Future Internet technologies that have to be met to accomplish the specific challenges of agri-food logistics and identifies a set of generic technical enablers as input for the realisation of a FI core platform.

How to play any mental game, or a completeness theorem for protocols with honest majority

Permission to copy without fee all or part of this material is granted provided that the copies are not made or Idistributed for direct commercial advantage, the ACM copyright notice and the title of

A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks

A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.

Universally composable security: a new paradigm for cryptographic protocols

  • R. Canetti
  • Computer Science, Mathematics
    Proceedings 2001 IEEE International Conference on Cluster Computing
  • 2001
It is shown how to formulate universally composable definitions of security for practically any cryptographic task, and it is demonstrated that practically any such definition can be realized using known techniques, as long as only a minority of the participants are corrupted.