{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T02:39:49Z","timestamp":1774492789861,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032061751","type":"print"},{"value":"9783032061768","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T00:00:00Z","timestamp":1758499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06176-8_3","type":"book-chapter","created":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T15:58:10Z","timestamp":1758470290000},"page":"45-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Blockchain-Based Range Proof Framework in\u00a0Supply Chain"],"prefix":"10.1007","author":[{"given":"Jianyu","family":"Zou","sequence":"first","affiliation":[]},{"given":"Songlin","family":"He","sequence":"additional","affiliation":[]},{"given":"Xukang","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Dongliang","family":"Chu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,22]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Aceto, G., Persico, V., Pescap\u00e9, A.: A survey on information and communication technologies for industry 4.0: state-of-the-art, taxonomies, perspectives, and challenges. IEEE Commun. Surv. Tutor. 21(4), 3467\u20133501 (2019)","DOI":"10.1109\/COMST.2019.2938259"},{"key":"3_CR2","unstructured":"Ajaero, T.K.: 30 Supply Chain Statistics to Keep in Mind in 2024. Procurement Tactics (2024)"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1038\/s41586-021-03998-y","volume":"599","author":"P Alikhani","year":"2021","unstructured":"Alikhani, P., Brunner, N., Cr\u00e9peau, C., et al.: Experimental relativistic zero-knowledge proofs. Nature 599, 47\u201350 (2021)","journal-title":"Nature"},{"key":"3_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2025.111118","volume":"204","author":"R Alizadeh","year":"2025","unstructured":"Alizadeh, R., Jokar, M.: Mathematical models and concepts for blockchain network design in supply chain. Comput. Ind. Eng. 204, 111118 (2025)","journal-title":"Comput. Ind. Eng."},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-030-56880-1_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"T Attema","year":"2020","unstructured":"Attema, T., Lyubashevsky, V., Seiler, G.: Practical product proofs for lattice commitments. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12171, pp. 470\u2013499. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56880-1_17"},{"key":"3_CR6","unstructured":"Boneh, D., Fisch, B., Gabizon, A., Williamson, Z.: A simple range proof from polynomial commitments. Cryptology ePrint Archive, Report 2020\/152 (2020)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315\u2013334. IEEE (2018)","DOI":"10.1109\/SP.2018.00020"},{"issue":"4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"76","DOI":"10.2478\/popets-2021-0061","volume":"2021","author":"K Chalkias","year":"2021","unstructured":"Chalkias, K., Cohen, S., Lewi, K., Moezinia, F., Romailler, Y.: Hashwires: hyperefficient credential-based range proofs. Proc. Priv. Enhancing Technol. 2021(4), 76\u201395 (2021)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-48071-4_7","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 92","author":"D Chaum","year":"1993","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89\u2013105. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-48071-4_7"},{"issue":"2","key":"3_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/cryptography8020012","volume":"8","author":"X Chen","year":"2024","unstructured":"Chen, X., He, S., Sun, L., Zheng, Y., Wu, C.Q.: A survey of consortium blockchain and its applications. Cryptography 8(2), 12 (2024)","journal-title":"Cryptography"},{"key":"3_CR11","unstructured":"Chopra, S., Meindl, P.: Supply Chain Management: Strategy, Planning, and Operation, 7th edn. Pearson (2019)"},{"key":"3_CR12","unstructured":"Christ, M., Baldimtsi, F., Chalkias, K., Maram, D., Roy, A., Wang, J.: SoK: Zero-knowledge range proofs. Technical Report 2024\/430, Cryptology ePrint Archive (2024)"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1109\/TEM.2020.2971858","volume":"67","author":"M Du","year":"2020","unstructured":"Du, M., Chen, Q., Xiao, J., Yang, H., Ma, X.: Supply chain finance innovation using blockchain. IEEE Trans. Eng. Manage. 67(4), 1045\u20131058 (2020)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Eckey, L., Faust, S.: FairSwap: how to fairly exchange digital goods. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 967\u2013984. ACM (2018)","DOI":"10.1145\/3243734.3243857"},{"issue":"4","key":"3_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"TE Gamal","year":"1985","unstructured":"Gamal, T.E.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.jpdc.2022.01.002","volume":"163","author":"S He","year":"2022","unstructured":"He, S., et al.: Blockchain-based automated and robust cyber security management. J. Parallel Distrib. Comput. 163, 62\u201382 (2022)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"2","key":"3_CR18","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TPDS.2022.3217036","volume":"34","author":"S He","year":"2022","unstructured":"He, S., Lu, Y., Tang, Q., Wang, G., Wu, C.Q.: Blockchain-based P2P content delivery with monetary incentivization and fairness guarantee. IEEE Trans. Parallel Distrib. Syst. 34(2), 746\u2013765 (2022)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"He, S., Lyu, X., Chu, D.: Legacy compatible and sybil resistant decentralized identity management for IoTs. In: International Conference on Blockchain, pp. 33\u201349. Springer (2024)","DOI":"10.1007\/978-3-031-77095-1_3"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"He, S., et al.: Secure and efficient agreement signing atop blockchain and decentralized identity. In: International Conference on Blockchain and Trustworthy Systems, pp. 3\u201317. Springer (2022)","DOI":"10.1007\/978-981-19-8043-5_1"},{"issue":"1","key":"3_CR21","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TII.2019.2939797","volume":"16","author":"S He","year":"2019","unstructured":"He, S., Tang, Q., Wu, C.Q., Shen, X.: Decentralizing IoT management systems using blockchain for censorship resistance. IEEE Trans. Industr. Inf. 16(1), 715\u2013727 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"3_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.tifs.2025.104892","volume":"157","author":"E Henrichs","year":"2025","unstructured":"Henrichs, E., Boller, M., Stolz, J., Krupitzer, C.: Quantum of trust: overview of blockchain technology for product authentication in food and pharmaceutical supply chains. Trends Food Sci. Technol. 157, 104892 (2025)","journal-title":"Trends Food Sci. Technol."},{"key":"3_CR23","unstructured":"Hu, Y., et al.: zkPoD: a practical decentralized system for data exchange. In: IEEE Symposium on Security and Privacy (SP), pp. 893\u2013910. IEEE (2020)"},{"key":"3_CR24","unstructured":"IBM: Private and confidential transactions with hyperledger fabric. IBM developerWorks (2018)"},{"issue":"2","key":"3_CR25","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1109\/JIOT.2022.3206337","volume":"10","author":"L Li","year":"2023","unstructured":"Li, L., Huang, D., Zhang, C.: An efficient DAG blockchain architecture for IoT. IEEE Internet Things J. 10(2), 1286\u20131296 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"3_CR26","doi-asserted-by":"publisher","first-page":"8886","DOI":"10.1109\/TMC.2024.3357499","volume":"23","author":"W Li","year":"2024","unstructured":"Li, W., et al.: CoralDB: a collaborative database for data sharing based on permissioned blockchain. IEEE Trans. Mob. Comput. 23(9), 8886\u20138901 (2024)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"3_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2025.100704","volume":"31","author":"C Ma","year":"2025","unstructured":"Ma, C., Zhao, H., Zhang, K., Zhang, L., Huang, H.: A federated supply chain finance risk control method based on personalized differential privacy. Egypt. Inform. J. 31, 100704 (2025)","journal-title":"Egypt. Inform. J."},{"key":"3_CR28","volume":"30","author":"V Natanelov","year":"2022","unstructured":"Natanelov, V., Cao, S., Foth, M., Dulleck, U.: Blockchain smart contracts for supply chain finance: mapping the innovation potential in Australia-China beef supply chains. J. Ind. Inf. Integr. 30, 100389 (2022)","journal-title":"J. Ind. Inf. Integr."},{"key":"3_CR29","unstructured":"Pagnia, H., G\u00e4rtner, F.: On the impossibility of fair exchange without a trusted third party. Technical Report TUD-BS-1999-02, Darmstadt University of Technology (1999)"},{"issue":"1","key":"3_CR30","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.ejor.2010.08.018","volume":"208","author":"R Pibernik","year":"2011","unstructured":"Pibernik, R., Zhang, Y., Kerschbaum, F., Schr\u00f6pfer, A.: Secure collaborative supply chain planning and inverse optimization \u2013 the JELS model. Eur. J. Oper. Res. 208(1), 75\u201385 (2011)","journal-title":"Eur. J. Oper. Res."},{"issue":"1","key":"3_CR31","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s12159-015-0123-6","volume":"8","author":"J Pradabwong","year":"2015","unstructured":"Pradabwong, J., Braziotis, C., Pawar, K., Tannock, J.: Business process management and supply chain collaboration: a critical comparison. Logist. Res. 8(1), 6 (2015)","journal-title":"Logist. Res."},{"key":"3_CR32","unstructured":"Precedence Research: Supply Chain Management Market (By Component: Hardware, Software, Services; By Deployment: On-premise, Cloud-based) - Global Industry Analysis, Size, Share, Growth, Trends, Regional Outlook, and Forecast 2024\u20132034. Technical report, Precedence Research (2024)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Qader, G., Junaid, M., Abbas, Q., Mubarik, M.: Industry 4.0 enables supply chain resilience and supply chain performance. Technol. Forecast. Soc. Change 185, 122026 (2022)","DOI":"10.1016\/j.techfore.2022.122026"},{"key":"3_CR34","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.future.2023.06.009","volume":"148","author":"A Sarfaraz","year":"2023","unstructured":"Sarfaraz, A., Chakrabortty, R., Essam, D.: AccessChain: an access control framework to protect data access in blockchain enabled supply chain. Futur. Gener. Comput. Syst. 148, 380\u2013394 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"3_CR35","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/OJCS.2020.3025313","volume":"1","author":"D Shakhbulatov","year":"2020","unstructured":"Shakhbulatov, D., Medina, J., Dong, Z., Rojas-Cessa, R.: How blockchain enhances supply chain management: a survey. IEEE Open J. Comput. Soc. 1, 230\u2013249 (2020)","journal-title":"IEEE Open J. Comput. Soc."},{"key":"3_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112475","volume":"168","author":"X Tang","year":"2025","unstructured":"Tang, X., et al.: Federated graph neural network for privacy-preserved supply chain data sharing. Appl. Soft Comput. 168, 112475 (2025)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"3_CR37","first-page":"438","volume":"16","author":"M Wang","year":"2023","unstructured":"Wang, M., Guo, Y., Zhang, C., Wang, C., Huang, H., Jia, X.: MedShare: a privacy-preserving medical data sharing system by using blockchain. IEEE Trans. Serv. Comput. 16(1), 438\u2013451 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"3_CR38","doi-asserted-by":"publisher","first-page":"9019","DOI":"10.1109\/JIOT.2023.3321889","volume":"11","author":"C Xu","year":"2024","unstructured":"Xu, C., Qu, Y., Xiang, Y., Luan, T., Gao, L.: An optimized privacy-protected blockchain system for supply chain on internet of things. IEEE Internet Things J. 11(5), 9019\u20139030 (2024)","journal-title":"IEEE Internet Things J."},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Yan, Z., He, S., Wu, C., Hou, A.: Optimized deliverer selection in blockchain-based P2P content delivery networks. In: IEEE International Performance, Computing, and Communications Conference (IPCCC), pp.\u00a01\u20138. IEEE (2024)","DOI":"10.1109\/IPCCC59868.2024.10850174"},{"issue":"12","key":"3_CR40","doi-asserted-by":"publisher","first-page":"9227","DOI":"10.1109\/TII.2022.3164433","volume":"18","author":"P Zheng","year":"2022","unstructured":"Zheng, P., et al.: Aeolus: distributed execution of permissioned blockchain transactions via state sharding. IEEE Trans. Industr. Inf. 18(12), 9227\u20139238 (2022)","journal-title":"IEEE Trans. Industr. Inf."}],"container-title":["Lecture Notes in Computer Science","Blockchain \u2013 ICBC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06176-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T22:04:26Z","timestamp":1758492266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06176-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,22]]},"ISBN":["9783032061751","9783032061768"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06176-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,22]]},"assertion":[{"value":"22 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.servicessociety.org\/icbc","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}