{"title":"Proofs of Existence for Data in Cross-Company Blockchain Networks","authors":"Erik Neumann","doi":"10.52825/ocp.v2i.174","DOIUrl":null,"url":null,"abstract":"The safe-UR-chain project is focused on the tamper-proof storage of production-related data and its exchange across company boundaries. The system is based on 'entangled' blockchains, i.e., each company maintains its own blockchain and sporadically integrates block hashes from the blockchains of other companies into it. This makes it possible, to verify the existence and integrity of data from another company’s blockchain later. To prove that the data has not been tampered with, an efficient cryptographic accumulator is used. This accumulator makes it possible to show, that a block is included at a certain position within a blockchain. Based on this proof, the existence and integrity of data in another company’s blockchain can be verified.","PeriodicalId":89291,"journal":{"name":"The open conference proceedings journal","volume":"42 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The open conference proceedings journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52825/ocp.v2i.174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The safe-UR-chain project is focused on the tamper-proof storage of production-related data and its exchange across company boundaries. The system is based on 'entangled' blockchains, i.e., each company maintains its own blockchain and sporadically integrates block hashes from the blockchains of other companies into it. This makes it possible, to verify the existence and integrity of data from another company’s blockchain later. To prove that the data has not been tampered with, an efficient cryptographic accumulator is used. This accumulator makes it possible to show, that a block is included at a certain position within a blockchain. Based on this proof, the existence and integrity of data in another company’s blockchain can be verified.