{"id":"https://openalex.org/W4415741519","doi":"https://doi.org/10.1007/s44443-025-00318-6","title":"VTraceChain: A verifiable block chain with double-chain architecture for enhanced tracking","display_name":"VTraceChain: A verifiable block chain with double-chain architecture for enhanced tracking","publication_year":2025,"publication_date":"2025-10-31","ids":{"openalex":"https://openalex.org/W4415741519","doi":"https://doi.org/10.1007/s44443-025-00318-6"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00318-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00318-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00318-6.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00318-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058522008","display_name":"Xiaohu Shi","orcid":"https://orcid.org/0000-0002-5115-8137"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]},{"id":"https://openalex.org/I4210134929","display_name":"Jilin Province Science and Technology Department","ror":"https://ror.org/049x38272","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210134929"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohu Shi","raw_affiliation_strings":["College of Computer Science and Technology, Jilin University, 130012, Qianjin Street, Changchun, China","College of Software, Jilin University, 130012, Qianjin Street, Changchun, China","Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education, Jilin University, 130012, Qianjin Street, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Jilin University, 130012, Qianjin Street, Changchun, China","institution_ids":["https://openalex.org/I194450716","https://openalex.org/I4210134929"]},{"raw_affiliation_string":"College of Software, Jilin University, 130012, Qianjin Street, Changchun, China","institution_ids":["https://openalex.org/I194450716"]},{"raw_affiliation_string":"Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education, Jilin University, 130012, Qianjin Street, Changchun, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074719963","display_name":"Y. M. Zhao","orcid":"https://orcid.org/0000-0001-6291-9387"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yumin Zhao","raw_affiliation_strings":["College of Software, Jilin University, 130012, Qianjin Street, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Software, Jilin University, 130012, Qianjin Street, Changchun, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101709934","display_name":"Liang Tao","orcid":"https://orcid.org/0000-0001-5709-0834"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Liang","raw_affiliation_strings":["College of Software, Jilin University, 130012, Qianjin Street, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Software, Jilin University, 130012, Qianjin Street, Changchun, China","institution_ids":["https://openalex.org/I194450716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113161679","display_name":"Haidong Ma","orcid":"https://orcid.org/0000-0002-0971-0098"},"institutions":[{"id":"https://openalex.org/I194450716","display_name":"Jilin University","ror":"https://ror.org/00js3aw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I194450716"]},{"id":"https://openalex.org/I4210134929","display_name":"Jilin Province Science and Technology Department","ror":"https://ror.org/049x38272","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210134929"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haidong Ma","raw_affiliation_strings":["College of Computer Science and Technology, Jilin University, 130012, Qianjin Street, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Jilin University, 130012, Qianjin Street, Changchun, China","institution_ids":["https://openalex.org/I194450716","https://openalex.org/I4210134929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100511501","display_name":"Deyin Ma","orcid":"https://orcid.org/0009-0001-0735-2602"},"institutions":[{"id":"https://openalex.org/I4385474403","display_name":"Changchun University of Technology","ror":"https://ror.org/052pakb34","country_code":null,"type":"education","lineage":["https://openalex.org/I4385474403"]}],"countries":[],"is_corresponding":true,"raw_author_name":"Deyin Ma","raw_affiliation_strings":["College of Computer Science and Engineering, Changchun University of Technology, 130012, Yanan Street, Changchun, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Changchun University of Technology, 130012, Yanan Street, Changchun, China","institution_ids":["https://openalex.org/I4385474403"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100511501"],"corresponding_institution_ids":["https://openalex.org/I4385474403"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":3.3265,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9437057,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"37","issue":"9","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8223000168800354,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8223000168800354,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12486","display_name":"Food Supply Chain Traceability","score":0.06759999692440033,"subfield":{"id":"https://openalex.org/subfields/1106","display_name":"Food Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.012400000356137753,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.7502999901771545},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6674000024795532},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6251000165939331},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5273000001907349},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.4465000033378601},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.391400009393692},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3734000027179718},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.36390000581741333},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.34709998965263367}],"concepts":[{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.7502999901771545},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7389000058174133},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6674000024795532},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6251000165939331},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5273000001907349},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4851999878883362},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.4465000033378601},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44519999623298645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4090000092983246},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.391400009393692},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3734000027179718},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.36390000581741333},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.34709998965263367},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34130001068115234},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.32659998536109924},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.32359999418258667},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.321399986743927},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.30660000443458557},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.30480000376701355},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.2971999943256378},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.2786000072956085},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2678999900817871},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25459998846054077},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.2517000138759613}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00318-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00318-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00318-6.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1e98d12eedc04d74a0ddb880b9e8ba12","is_oa":true,"landing_page_url":"https://doaj.org/article/1e98d12eedc04d74a0ddb880b9e8ba12","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 37, Iss 9, Pp 1-24 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00318-6","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00318-6","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00318-6.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322174","display_name":"People's Government of Jilin Province","ror":"https://ror.org/02fzqav45"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415741519.pdf","grobid_xml":"https://content.openalex.org/works/W4415741519.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1600255172","https://openalex.org/W2889403099","https://openalex.org/W2971532963","https://openalex.org/W2997335690","https://openalex.org/W3046004324","https://openalex.org/W3083323022","https://openalex.org/W3116587385","https://openalex.org/W3132340800","https://openalex.org/W3158987807","https://openalex.org/W3199844942","https://openalex.org/W3200971636","https://openalex.org/W4285189682","https://openalex.org/W4294811458","https://openalex.org/W4313250543","https://openalex.org/W4313826623","https://openalex.org/W4319216108","https://openalex.org/W4366823186","https://openalex.org/W4388182424","https://openalex.org/W4388861983","https://openalex.org/W4392941429","https://openalex.org/W4394855187","https://openalex.org/W4399381736","https://openalex.org/W4402117536","https://openalex.org/W4402456712"],"related_works":[],"abstract_inverted_index":{"Traceability":[0,88],"is":[1,50,93,234],"critical":[2],"for":[3,240,261],"ensuring":[4],"supply":[5,267],"chain":[6,268],"transparency,":[7,42],"safeguarding":[8],"food":[9],"safety,":[10],"enhancing":[11],"consumer":[12],"trust,":[13],"and":[14,26,41,53,62,95,121,139,148,179,199,211,219,226,237,243,252],"improving":[15],"operational":[16],"efficiency.":[17],"However,":[18],"conventional":[19],"traceability":[20,74,163],"systems":[21],"rely":[22],"on":[23,77,86,97,158],"centralized":[24],"storage":[25,107],"capture":[27],"only":[28],"partial":[29],"product":[30],"data,":[31],"making":[32],"them":[33],"vulnerable":[34],"to":[35,104,132,135,192],"tampering.":[36],"While":[37],"blockchain":[38],"provides":[39,257],"immutability":[40],"it":[43],"raises":[44],"privacy":[45],"concerns":[46],"when":[47],"enterprise-sensitive":[48,91],"data":[49,83],"placed":[51],"on-chain,":[52],"existing":[54],"consensus":[55,124,137],"protocols":[56],"often":[57],"suffer":[58],"from":[59],"poor":[60],"scalability":[61],"high":[63,189],"latency.":[64],"To":[65],"address":[66],"these":[67],"challenges,":[68],"we":[69],"propose":[70],"VTraceChain,":[71],"a":[72,78,87,98,122,154,165,235,258],"verifiable":[73],"framework":[75,256],"based":[76],"double-chain":[79],"architecture.":[80],"Public":[81],"lifecycle":[82],"are":[84],"recorded":[85],"Chain,":[89,100],"while":[90],"information":[92],"encrypted":[94],"stored":[96],"Data":[99],"with":[101,208,223],"IPFS":[102],"integration":[103],"minimize":[105],"on-chain":[106],"overhead.":[108],"A":[109],"Verifiable":[110],"Cross-Chain":[111],"Integrity":[112],"Mechanism":[113],"(VCIM)":[114],"ensures":[115],"consistency":[116],"between":[117],"the":[118,172,186,255],"two":[119],"chains,":[120],"novel":[123],"protocol\u2013Proof":[125],"of":[126,156],"Point":[127],"Competitiveness":[128],"(PoPc)\u2013links":[129],"node":[130],"behavior":[131],"reputation":[133],"scores":[134],"improve":[136],"efficiency":[138],"reliability.":[140],"An":[141],"incentive":[142],"mechanism":[143],"further":[144],"promotes":[145],"honest":[146],"participation":[147],"deters":[149],"malicious":[150],"activity.":[151],"We":[152],"implement":[153],"prototype":[155,187],"VTraceChain":[157,233],"Hyperledger":[159],"Fabric":[160],"using":[161],"ginseng":[162],"as":[164],"case":[166],"study.":[167],"Security":[168],"analyses":[169],"demonstrate":[170],"that":[171,185,217,232],"system":[173],"effectively":[174],"resists":[175],"Eclipse,":[176],"replay,":[177],"Sybil,":[178],"spoofing":[180],"attacks.":[181],"Performance":[182],"evaluations":[183],"show":[184],"achieves":[188],"throughput":[190,218],"(up":[191],"152":[193],"TPS),":[194],"low":[195],"latency":[196,220],"(0.11":[197],"s),":[198],"stable":[200],"resource":[201],"consumption":[202],"under":[203],"varying":[204],"workloads.":[205],"Scalability":[206],"experiments":[207],"200\u20131000":[209],"nodes":[210],"100/300/500":[212],"transactions":[213],"per":[214],"second":[215],"confirm":[216],"remain":[221],"stable,":[222],"smooth":[224],"trends":[225],"no":[227],"instability.":[228],"These":[229],"results":[230],"indicate":[231],"practical":[236],"efficient":[238],"solution":[239],"secure,":[241],"scalable,":[242],"privacy-preserving":[244],"blockchain-based":[245],"traceability.":[246],"By":[247],"explicitly":[248],"addressing":[249],"both":[250],"security":[251],"performance":[253],"requirements,":[254],"reproducible":[259],"foundation":[260],"future":[262],"real-world":[263],"deployments":[264],"in":[265],"multi-party":[266],"environments.":[269]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-31T00:00:00"}
