{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:59:18Z","timestamp":1768294758206,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T00:00:00Z","timestamp":1704153600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T00:00:00Z","timestamp":1704153600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Foundation of National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61962009 and 62202118"],"award-info":[{"award-number":["61962009 and 62202118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"crossref","award":["ZR2021MF086"],"award-info":[{"award-number":["ZR2021MF086"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Top Technology Talent Project from Guizhou Education Department","award":["[2022]073"],"award-info":[{"award-number":["[2022]073"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Artificial intelligence and blockchain technology have become indispensable in the era of the digital economy, particularly in the field of financial financing. However, when it comes to supply chain finance (SCF), existing models primarily focus on risk identification and credit evaluation, neglecting the critical aspects of trust transfer continuity and reliability within the chain. To address this issue, this paper proposes a blockchain-based transitive trust model for SCF, which ensures seamless trust transfer from core enterprises to bottom suppliers during financing enterprise credit evaluation. The model utilizes multi-layer metrics to calculate the comprehensive trust value of underlying suppliers, serving as the basis for credit delivery. Additionally, the model stores transitive signature receivable warrants on the blockchain and utilizes splittable delivery of warrants to underlying suppliers. The model\u2019s rationality and correctness are verified through experimental analysis, with results demonstrating that the transitive trust model enhances Small and Medium-Sized Enterprises\u2019 (SMEs) trust at the bottom of the supply chain, thus alleviating financing difficulties for SMEs.<\/jats:p>","DOI":"10.1186\/s13677-023-00557-w","type":"journal-article","created":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T14:02:47Z","timestamp":1704204167000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model"],"prefix":"10.1186","volume":"13","author":[{"given":"Chang","family":"Shu","sequence":"first","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chaoyue","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Dou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,2]]},"reference":[{"key":"557_CR1","doi-asserted-by":"crossref","unstructured":"Sinha D, Roy R (2020) Reviewing cyber-physical system as a part of smart factory in industry 4.0. IEEE Eng Manag Rev 48(2):103\u2013117","DOI":"10.1109\/EMR.2020.2992606"},{"issue":"4","key":"557_CR2","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1109\/TEM.2020.2971858","volume":"67","author":"M Du","year":"2020","unstructured":"Du M, Chen Q, Xiao J, Yang H, Ma X (2020) Supply chain finance innovation using blockchain. IEEE Trans Eng Manag 67(4):1045\u20131058","journal-title":"IEEE Trans Eng Manag"},{"key":"557_CR3","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.ijpe.2019.07.002","volume":"219","author":"HL Ma","year":"2020","unstructured":"Ma HL, Wang Z, Chan FT (2020) How important are supply chain collaborative factors in supply chain finance? a view of financial service providers in china. Int J Prod Econ 219:341\u2013346","journal-title":"Int J Prod Econ"},{"issue":"2","key":"557_CR4","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TCSS.2022.3168595","volume":"10","author":"S Wu","year":"2022","unstructured":"Wu S, Shen S, Xu X, Chen Y, Zhou X, Liu D, Xue X, Qi L (2022) Popularity-aware and diverse web apis recommendation based on correlation graph. IEEE Trans Comput Soc Syst 10(2):771\u2013782","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"557_CR5","doi-asserted-by":"crossref","unstructured":"Qi L, Lin W, Zhang X, Dou W, Xu X, Chen J (2022) A correlation graph based approach for personalized and compatible web apis recommendation in mobile app development. IEEE Trans Knowl Data Eng 35(6):5444\u20135457","DOI":"10.1109\/TKDE.2022.3168611"},{"key":"557_CR6","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.patrec.2023.02.008","volume":"167","author":"Y Wang","year":"2023","unstructured":"Wang Y, Qi L, Dou R, Shen S, Hou L, Liu Y, Yang Y, Kong L (2023) An accuracy-enhanced group recommendation approach based on dematel. Pattern Recogn Lett 167:171\u2013180","journal-title":"Pattern Recogn Lett"},{"key":"557_CR7","doi-asserted-by":"crossref","unstructured":"Dai H, Yu J, Li M, Wang W, Liu AX, Ma J, Qi L, Chen G (2022) Bloom filter with noisy coding framework for multi-set membership testing. IEEE Trans Knowl Data Eng 35(7):6710\u20136724","DOI":"10.1109\/TKDE.2022.3199646"},{"issue":"2s","key":"557_CR8","first-page":"1","volume":"18","author":"C Yang","year":"2022","unstructured":"Yang C, Xu X, Zhou X, Qi L (2022) Deep q network-driven task offloading for efficient multimedia data analysis in edge computing-assisted iov. ACM Trans Multimed Comput Commun Appl 18(2s):1\u201324","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"557_CR9","doi-asserted-by":"publisher","unstructured":"He Q, Tan S, Chen F, Xu X, Qi L, Hei X, et al (2023) Edindex: enabling fast data queries in edge storage systems.\u00a0In: Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval. Tai Wan, China, p 675\u2013685. https:\/\/doi.org\/10.1145\/3539618.3591676","DOI":"10.1145\/3539618.3591676"},{"issue":"2","key":"557_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3401979","volume":"17","author":"X Xu","year":"2021","unstructured":"Xu X, Fang Z, Qi L, Zhang X, He Q, Zhou X (2021) Tripres: Traffic flow prediction driven resource reservation for multimedia iov with edge computing. ACM Trans Multimed Comput Commun Appl 17(2):1\u201321","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"9","key":"557_CR11","doi-asserted-by":"publisher","first-page":"6300","DOI":"10.1109\/TII.2022.3154473","volume":"18","author":"Y Jia","year":"2022","unstructured":"Jia Y, Liu B, Dou W, Xu X, Zhou X, Qi L, Yan Z (2022) Croapp: a cnn-based resource optimization approach in edge computing environment. IEEE Trans Ind Inform 18(9):6300\u20136307","journal-title":"IEEE Trans Ind Inform"},{"key":"557_CR12","doi-asserted-by":"publisher","unstructured":"Li Z, Xu X, Hang T, Xiang H, Cui Y, Qi L, Zhou X (2022) A knowledge-driven anomaly detection framework for social production system. IEEE Trans Comput Soc Syst. 2022. https:\/\/doi.org\/10.1109\/TCSS.2022.3217790","DOI":"10.1109\/TCSS.2022.3217790"},{"key":"557_CR13","doi-asserted-by":"crossref","unstructured":"Xu X, Gu J, Yan H, Liu W, Qi L, Zhou X (2022) Reputation-aware supplier assessment for blockchain-enabled supply chain in industry 4.0. IEEE Trans Ind Inform 19(4):5485\u20135494","DOI":"10.1109\/TII.2022.3190380"},{"key":"557_CR14","doi-asserted-by":"crossref","unstructured":"Li T, Chen Y, Wang Y, Wang Y, Zhao M, Zhu H, Tian Y, Yu X, Yang Y (2020a) Rational protocols and attacks in blockchain system. Secur Commun Netw 2020","DOI":"10.1155\/2020\/8839047"},{"key":"557_CR15","first-page":"1","volume":"2020","author":"T Li","year":"2020","unstructured":"Li T, Chen Y, Wang Y, Wang Y, Zhao M, Zhu H, Tian Y, Yu X, Yang Y (2020) Rational protocols and attacks in blockchain system. Secur Commun Netw 2020:1\u201311","journal-title":"Secur Commun Netw"},{"issue":"12","key":"557_CR16","doi-asserted-by":"publisher","first-page":"10576","DOI":"10.1002\/int.22656","volume":"37","author":"T Li","year":"2022","unstructured":"Li T, Wang Z, Chen Y, Li C, Jia Y, Yang Y (2022) Is semi-selfish mining available without being detected? Int J Intell Syst 37(12):10576\u201310597","journal-title":"Int J Intell Syst"},{"issue":"2","key":"557_CR17","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1002\/int.22666","volume":"37","author":"Y Chen","year":"2022","unstructured":"Chen Y, Sun J, Yang Y, Li T, Niu X, Zhou H (2022) Psspr: a source location privacy protection scheme based on sector phantom routing in wsns. Int J Intell Syst 37(2):1204\u20131221","journal-title":"Int J Intell Syst"},{"issue":"1","key":"557_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.3390\/e22010095","volume":"22","author":"J Chen","year":"2020","unstructured":"Chen J, Cai T, He W, Chen L, Zhao G, Zou W, Guo L (2020) A blockchain-driven supply chain finance application for auto retail industry. Entropy 22(1):95","journal-title":"Entropy"},{"issue":"1","key":"557_CR19","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/logistics2010002","volume":"2","author":"K Francisco","year":"2018","unstructured":"Francisco K, Swanson D (2018) The supply chain has no clothes: Technology adoption of blockchain for supply chain transparency. Logistics 2(1):2","journal-title":"Logistics"},{"issue":"5","key":"557_CR20","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1093\/rfs\/hhz007","volume":"32","author":"LW Cong","year":"2019","unstructured":"Cong LW, He Z (2019) Blockchain disruption and smart contracts. Rev Financ Stud 32(5):1754\u20131797","journal-title":"Rev Financ Stud"},{"key":"557_CR21","doi-asserted-by":"crossref","unstructured":"Malik S, Dedeoglu V, Kanhere SS, Jurdak R (2019) Trustchain: Trust management in blockchain and iot supported supply chains. In: IEEE International Conference on Blockchain (Blockchain). Atlanta, p 184\u2013193","DOI":"10.1109\/Blockchain.2019.00032"},{"issue":"5","key":"557_CR22","doi-asserted-by":"publisher","first-page":"4000","DOI":"10.1109\/JIOT.2019.2960526","volume":"7","author":"M Zhaofeng","year":"2019","unstructured":"Zhaofeng M, Lingyun W, Xiaochang W, Zhen W, Weizhe Z (2019) Blockchain-enabled decentralized trust management and secure usage control of iot big data. IEEE Internet Things J 7(5):4000\u20134015","journal-title":"IEEE Internet Things J"},{"key":"557_CR23","doi-asserted-by":"publisher","first-page":"103699","DOI":"10.1016\/j.csi.2022.103699","volume":"84","author":"Y Chen","year":"2023","unstructured":"Chen Y, Li Y, Chen Q, Wang X, Li T, Tan C (2023) Energy trading scheme based on consortium blockchain and game theory. Comput Stand Interfaces 84:103699","journal-title":"Comput Stand Interfaces"},{"key":"557_CR24","doi-asserted-by":"publisher","first-page":"108469","DOI":"10.1016\/j.ijpe.2022.108469","volume":"247","author":"R Jiang","year":"2022","unstructured":"Jiang R, Kang Y, Liu Y, Liang Z, Duan Y, Sun Y, Liu J (2022) A trust transitivity model of small and medium-sized manufacturing enterprises under blockchain-based supply chain finance. Int J Prod Econ 247:108469","journal-title":"Int J Prod Econ"},{"key":"557_CR25","doi-asserted-by":"publisher","first-page":"5239","DOI":"10.1109\/TIFS.2021.3127023","volume":"16","author":"Y Chen","year":"2021","unstructured":"Chen Y, Dong S, Li T, Wang Y, Zhou H (2021) Dynamic multi-key fhe in asymmetric key setting from lwe. IEEE Trans Inf Forensic Secur 16:5239\u20135249","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"557_CR26","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.future.2022.09.008","volume":"138","author":"Y Ren","year":"2023","unstructured":"Ren Y, Huang D, Wang W, Yu X (2023) Bsmd: A blockchain-based secure storage mechanism for big spatio-temporal data. Futur Gener Comput Syst 138:328\u2013338","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"557_CR27","first-page":"84","volume":"44","author":"X Cai","year":"2021","unstructured":"Cai X, Deng Y, Zhang L, Shi J, Chen Q, Zhen W, Guo M (2021) The principle and core technology of blockchain. Chin J Comput 44(1):84\u2013131","journal-title":"Chin J Comput"},{"key":"557_CR28","doi-asserted-by":"crossref","unstructured":"Zheng P, Xu Q, Zheng Z, Zhou Z, Yan Y, Zhang H (2021) Meepo: Sharded consortium blockchain.\u00a0In: IEEE 37th International Conference on Data Engineering (ICDE). Chania, p 1847\u20131852","DOI":"10.1109\/ICDE51399.2021.00165"},{"issue":"5","key":"557_CR29","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TPDS.2020.3042392","volume":"32","author":"W Li","year":"2020","unstructured":"Li W, Feng C, Zhang L, Xu H, Cao B, Imran MA (2020) A scalable multi-layer PBFT consensus for blockchain. IEEE Trans Parallel Distrib Syst 32(5):1146\u20131160","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"557_CR30","doi-asserted-by":"publisher","unstructured":"Micali S, Rivest RL (2002) Transitive signature schemes. In: Preneel B (ed) Topics in Cryptology \u2014 CT-RSA 2002, vol 2271. Berlin. https:\/\/doi.org\/10.1007\/3-540-45760-7_16","DOI":"10.1007\/3-540-45760-7_16"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00557-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00557-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00557-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T14:15:33Z","timestamp":1704204933000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00557-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,2]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["557"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00557-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,2]]},"assertion":[{"value":"16 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"4"}}