{"id":"https://openalex.org/W4309675328","doi":"https://doi.org/10.1109/cns56114.2022.9947231","title":"Efficient Public Verification of Confidential Supply-Chain Transactions","display_name":"Efficient Public Verification of Confidential Supply-Chain Transactions","publication_year":2022,"publication_date":"2022-10-03","ids":{"openalex":"https://openalex.org/W4309675328","doi":"https://doi.org/10.1109/cns56114.2022.9947231"},"language":"en","primary_location":{"id":"doi:10.1109/cns56114.2022.9947231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns56114.2022.9947231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021321700","display_name":"Kilian Becher","orcid":null},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Kilian Becher","raw_affiliation_strings":["Technische Universit&#x00E4;t,Dresden,Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t,Dresden,Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058812118","display_name":"Mirko Sch\u00e4fer","orcid":"https://orcid.org/0000-0002-8029-949X"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mirko Schafer","raw_affiliation_strings":["Technische Universit&#x00E4;t,Dresden,Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit&#x00E4;t,Dresden,Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045911790","display_name":"Axel Schr\u00f6pfer","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132444","display_name":"Systems, Applications & Products in Data Processing (Germany)","ror":"https://ror.org/03dsc8d33","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210132444"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Axel Schropfer","raw_affiliation_strings":["SAP SE,Germany","SAP SE, Germany"],"affiliations":[{"raw_affiliation_string":"SAP SE,Germany","institution_ids":["https://openalex.org/I4210132444"]},{"raw_affiliation_string":"SAP SE, Germany","institution_ids":["https://openalex.org/I4210132444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053465128","display_name":"Thorsten Strufe","orcid":"https://orcid.org/0000-0002-8723-9692"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thorsten Strufe","raw_affiliation_strings":["Karsruhe Institute of Technology,Germany","Karsruhe Institute of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Karsruhe Institute of Technology,Germany","institution_ids":["https://openalex.org/I102335020"]},{"raw_affiliation_string":"Karsruhe Institute of Technology, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021321700"],"corresponding_institution_ids":["https://openalex.org/I78650965"],"apc_list":null,"apc_paid":null,"fwci":0.3032,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62757877,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"308","last_page":"316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.8519735932350159},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.7974610328674316},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5390249490737915},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5330231189727783},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5175737142562866},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49982714653015137},{"id":"https://openalex.org/keywords/sustainability","display_name":"Sustainability","score":0.4613073170185089},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4056597948074341},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4017086625099182},{"id":"https://openalex.org/keywords/environmental-economics","display_name":"Environmental economics","score":0.3646513819694519},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3585473895072937},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.08869946002960205}],"concepts":[{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.8519735932350159},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.7974610328674316},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5390249490737915},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5330231189727783},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5175737142562866},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49982714653015137},{"id":"https://openalex.org/C66204764","wikidata":"https://www.wikidata.org/wiki/Q219416","display_name":"Sustainability","level":2,"score":0.4613073170185089},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4056597948074341},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4017086625099182},{"id":"https://openalex.org/C134560507","wikidata":"https://www.wikidata.org/wiki/Q753291","display_name":"Environmental economics","level":1,"score":0.3646513819694519},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3585473895072937},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.08869946002960205},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns56114.2022.9947231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns56114.2022.9947231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W142045744","https://openalex.org/W1590823599","https://openalex.org/W1885156594","https://openalex.org/W2008472274","https://openalex.org/W2043007983","https://openalex.org/W2144752539","https://openalex.org/W2171337840","https://openalex.org/W2226167778","https://openalex.org/W2230212706","https://openalex.org/W2397857137","https://openalex.org/W2599930814","https://openalex.org/W2604969030","https://openalex.org/W2616239328","https://openalex.org/W2756242929","https://openalex.org/W2766738123","https://openalex.org/W2794970575","https://openalex.org/W2794982701","https://openalex.org/W2795187181","https://openalex.org/W2805552798","https://openalex.org/W2883748642","https://openalex.org/W2923799790","https://openalex.org/W2948832723","https://openalex.org/W2950533466","https://openalex.org/W2969862456","https://openalex.org/W3028867652","https://openalex.org/W3043762149","https://openalex.org/W3130871582","https://openalex.org/W6749720243","https://openalex.org/W6763622271","https://openalex.org/W6778434676","https://openalex.org/W6831118163"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W4221078281"],"abstract_inverted_index":{"Ensuring":[0],"sustainable":[1],"sourcing":[2],"of":[3,8,16,52,95,102,114],"crude":[4],"materials":[5],"and":[6,21,62,76,98,107,120],"production":[7,39],"goods":[9],"is":[10],"a":[11],"pressing":[12],"problem":[13],"in":[14,67,134],"consideration":[15],"the":[17],"growing":[18],"world":[19],"population":[20],"rapid":[22],"climate":[23],"change.":[24],"Supply-chain":[25],"traceability":[26,87],"systems":[27],"based":[28],"on":[29],"distributed":[30],"ledgers":[31],"can":[32,81],"help":[33],"to":[34,69,84,111],"enforce":[35],"sustainability":[36,113],"policies":[37],"like":[38],"limits.":[40],"We":[41],"propose":[42],"two":[43],"mutually":[44],"independent":[45],"distributed-ledger-based":[46],"protocols":[47,80,127],"that":[48,125],"enable":[49],"public":[50,100],"verifiability":[51,101],"policy":[53],"compliance.":[54],"They":[55,92],"are":[56],"designed":[57],"for":[58,130],"different":[59,64],"supply-chain":[60,72,86,132],"scenarios":[61,133],"use":[63],"privacy-enhancing":[65],"technologies":[66],"order":[68],"protect":[70],"confidential":[71],"data:":[73],"secret":[74],"sharing":[75],"homomorphic":[77],"encryption.":[78],"The":[79],"be":[82],"added":[83],"existing":[85],"solutions":[88],"with":[89],"minor":[90],"effort.":[91],"ensure":[93],"confidentiality":[94],"transaction":[96],"details":[97],"offer":[99],"producers'":[103],"compliance,":[104],"enabling":[105],"institutions":[106],"even":[108],"end":[109],"consumers":[110],"evaluate":[112],"supply":[115],"chains.":[116],"Through":[117],"extensive":[118],"theoretical":[119],"empirical":[121],"evaluation,":[122],"we":[123],"show":[124],"both":[126],"perform":[128],"verification":[129],"lifelike":[131],"perfectly":[135],"practical":[136],"time.":[137]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
