Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250100131-10.doi: 10.11896/jsjkx.250100131

• Information Security • Previous Articles     Next Articles

Privacy-preserving Cross-certificate System Authentication and Access Control Model for Material Supply Chain

YANG Ke1, GUO Qinglei2,3, SHEN Yiming4, BAI Neng4, SONG Wenting5, WANG Weiyu2,3   

  1. 1 State Grid Digital Technology Holding Co.,Ltd.,Beijing 100077,China
    2 State Grid Blockchain Technology(Beijing) Co.,Ltd.,Beijing 100077,China
    3 State Grid Blockchain Application Technology Laboratory,Beijing 100077,China
    4 State Grid Jiangsu Electric Power Co.,Ltd.,Materials Branch,Nanjing 210036,China
    5 Big Data Center of State Grid Corporation of China,Beijing 100052,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    Science and Technology Project of State Grid Electric Power Co.,Ltd.(5700-202418240A-1-1-ZN).

Abstract: Electronic data management has emerged as a pivotal tool for government and corporate procurement in the process of modernizing material supply chains,which plays a decisive role in boosting market competitiveness and ensuring fairness in transactions.However,electronic procurement faces several challenges,especially during the bidding process.These include the varying credibility of diverse electronic data sources,the difficulty of protecting bidders’ privacy,and potential risks of collusion between bidders and procurers.Blockchain technology,with its decentralized structure,distributed ledger,and high transparency,aligns well with the distributed nature of participants in electronic procurement.To address these challenges,this paper proposes a privacy-preserving multi-entity cross-certificate authentication and access control model for material supply chains.The system utilizes smart contracts to maintain a trust list and employs efficient Merkle tree signatures for certificate issuance with minimal storage overhead.This ensures the trustworthiness of both certificate authorities and bidders,while optimizing the cross-domain certificate verification process,further enhancing the transparency and consistency of authentication.Additionally,the system employs attribute-based encryption to encrypt and store sensitive data from bidders.Fine-grained access control is implemented to allow only authorized procurers to access the necessary information,effectively preventing collusion risks before the bid opening and ensures fairness and transparency in the bidding process.Rigorous security analysis and simulation tests demonstrate that the proposed solution not only supports multi-entity cross-certificate system authentication,but also safeguards bidder privacy,providing flexible and robust access control.

Key words: Material supply chain, Cross-certificate system authentication, Smart contract, Privacy preservation, Attribute-based encryption

CLC Number: 

  • TP309
[1]Guiding Opinions of the State Council on Accelerating the Establishment and Improvement of a Green,Low Carbon,and Circular Development Economic System[M].China Enterprise Reform and Development 2021 Blue Book State Counci,2021:5.DOI:10.26914/c.cnkihy.2021.070330.
[2]WANG Q L,REN Z Y,WU X Y,et al.Blockchain-based Internet of Things Traceable and Anonymous Cross-domain AuthenticationScheme[J].Computer Science,2025,52(5):337-344.
[3]TIAN H L,XIAN M J,GE P.Fine Grained Security Access Control Mechanism Based on Blockchain[J].Computer Science,2024,51(S1):1035-1041.
[4]FAN C I,WU C N,SUN W Z.Multi-recastable E-BiddingScheme[C]//2008 Eighth International Conference on Intelligent Systems Design and Applications.IEEE,2008:462-466.
[5]XU J,SONG J.A new management system for Intelligent E-Bidding[C]//2013 IEEE 4th International Conference on Software Engineering and Service Science.IEEE,2013:158-161.
[6]CHEN Y H,CHEN S H,LIN I C.Blockchain based smart contract for bidding system[C]//2018 IEEE International Confe-rence on Applied System Invention(ICASI).IEEE,2018:208-211.
[7]TRINH V A,TRINH V C.One-Verifier Signature Scheme andIts Applications[C]//Proceedings of the 10th International Symposium on Information and Communication Technology.2019:261-266.
[8]MANIMARAN P,DHANALAKSHMI R.Blockchain-basedsmart contract for e-bidding system[C]//2019 2nd International Conference on Intelligent Communication and Computational Techniques(ICCT).IEEE,2019:55-59.
[9]WANG D,ZHAO J,MU C.Research on blockchain-based e-bidding system[J].Applied Sciences,2021,11(9):4011.
[10]SARFARAZ A,CHAKRABORTTY R K,ESSAM D L.A tree structure-based improved blockchain framework for a secure online bidding system[J].Computers & Security,2021,102:102147.
[11]OMAR I A,HASAN H R,JAYARAMAN R,et al.Implemen-ting decentralized auctions using blockchain smart contracts[J].Technological Forecasting and Social Change,2021,168:120786.
[12]XU D,YANG Q.The systems approach and design path of electronic bidding systems based on blockchain technology[J].Electronics,2022,11(21):3501.
[13]MERKLER C.Secrecy,authentication,and public key systems[M].Stanford University,1979.
[14]LAURIE B.Certificate transparency[J].Communications of the ACM,2014,57(10):40-46.
[15]ZHANG Y Z,DENG R H,XU S M,et al.Attribute-based encryption for cloud computing access control:A survey[J].ACM Computing Surveys,2020,53(4):141.
[16]ZHANG Y,DENG R H,XU S,et al.Attribute-based encryption for cloud computing access control:A survey[J].ACM Computing Surveys,2020,53(4):1-41.
[17]LIU Z,CAO Z,WONGD S.Efficient generation of linear secret sharing scheme matrices from threshold access trees[J].Cryptology ePrint Archive,2010.
[18]SHEN M,LIU H,ZHU L,et al.Blockchain-assisted secure device authentication for cross-domain industrial IoT[J].IEEE Journal on Selected Areas in Communications,2020,38(5):942-954.
[19]JIA X,HU N,SU S,et al.IRBA:An identity-based cross-domain authentication scheme for the internet of things[J].Electronics,2020,9(4):634.
[1] ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375.
[2] LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395.
[3] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[4] SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379.
[5] TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7.
[6] XU Yiran, ZHOU Yu. Prompt Learning Based Parameter-efficient Code Generation [J]. Computer Science, 2024, 51(6): 61-67.
[7] LIU Wei, LIU Yuzhao, TANG Congke, WANG Yuanyuan, SHE Wei, TIAN Zhao. Study on Blockchain Based Federated Distillation Data Sharing Model [J]. Computer Science, 2024, 51(3): 39-47.
[8] JIANG Luhan, TIAN Youliang, XIANG Axin. CP-ABE Scheme Supports Fully Policy and Attribute Hidden [J]. Computer Science, 2024, 51(12): 317-325.
[9] LI Qiuyue, HAN Daojun, ZHANG Lei, XU Tao. Fine-grained Vulnerability Detection Based on Hierarchical Attention Networks and Integral Gradients [J]. Computer Science, 2024, 51(12): 326-333.
[10] YAN Li, YIN Tian, LIU Peishun, FENG Hongxin, WANG Gaozhou, ZHANG Wenbin, HU Hailin, PAN Fading. Overview of Attribute-based Searchable Encryption [J]. Computer Science, 2024, 51(11A): 231100137-12.
[11] MEN Ruirui, JIA Hongyong, DU Jinru. Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts [J]. Computer Science, 2024, 51(10): 372-379.
[12] TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25.
[13] ZHAO Yuhao, CHEN Siguang, SU Jian. Privacy-enhanced Federated Learning Algorithm Against Inference Attack [J]. Computer Science, 2023, 50(9): 62-67.
[14] ZHAO Mingmin, YANG Qiuhui, HONG Mei, CAI Chuang. Smart Contract Fuzzing Based on Deep Learning and Information Feedback [J]. Computer Science, 2023, 50(9): 117-122.
[15] ZHENG Hong, QIAN Shihui, LIU Zerun, DU Wen. Formal Verification of Supply Chain Contract Based on Coloured Petri Nets [J]. Computer Science, 2023, 50(6A): 220300220-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!