Open Access
ARTICLE
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
1 School of Cyberspace Security, Hainan University, Haikou, 570208, China
2 National Computer Network Emergency Response Technical Team, Coordination Center of China, Beijing, 100029, China
* Corresponding Author: Yanzhao Tian. Email:
Computers, Materials & Continua 2025, 83(2), 2351-2373. https://doi.org/10.32604/cmc.2025.062324
Received 16 December 2024; Accepted 28 January 2025; Issue published 16 April 2025
Abstract
The advent of the digital age has consistently provided impetus for facilitating global trade, as evidenced by the numerous customs clearance documents and participants involved in the international trade process, including enterprises, agents, and government departments. However, the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes. In addressing this need, this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption (MA-ABE) in combination with blockchain technology. This scheme supports proxy decryption, attribute revocation, and policy update, while allowing each participating entity to manage their keys autonomously, ensuring system security and enhancing trust among participants. In order to enhance system decentralization, a mechanism has been designed in the architecture where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters. Integration with the multi-party process execution engine Caterpillar has been shown to boost the transparency of cross-border information flow and cooperation between different organizations. The scheme ensures the auditability of data access control information and the visualization of on-chain data sharing. The MA-ABE scheme is statically secure under the q-Decisional Parallel Bilinear Diffie-Hellman Exponent (q-DPBDHE2) assumption in the random oracle model, and can resist ciphertext rollback attacks to achieve true backward and forward security. Theoretical analysis and experimental results demonstrate the appropriateness of the scheme for cross-border data collaboration between different institutions.Keywords
With the advent of the digital era, global economic and trade activities are becoming increasingly digitized, and international cross-border trade has entered a new stage of facilitation and efficiency [1]. To effectively reduce trade costs and enhance efficiency, paperless trade has emerged as a new trend [2]. According to estimates by the WTO, the current scale of digital trade has reached approximately $4 trillion, accounting for about half of the global service exports [3]. The entire international trade process typically encompasses at least 25 participants and generates 30–40 trade documents, with over 200 copies produced [3,4]. These documents in the international trade process must be extensively shared with various stakeholders, including importers, exporters, banks, logistics providers, government agencies, and customs [5]. Therefore, the rapid development of digital international trade urgently demands improvements in the secure and efficient sharing of cross-border data, thereby augmenting the utilization of shared data and promoting the globalization of the digital economy [6].
Currently, several challenges impede the effective cross-border sharing of data in international trade, including data redundancy, lack of trust, insufficient collaboration, privacy concerns, interoperability issues, and data source management [7]. In the face of these challenges, developing a technological solution that both strengthens trust mechanisms and ensures information security has become increasingly urgent. As blockchain technology matures, it is gradually emerging as an ideal solution to these issues due to its unique advantageous features. Blockchain not only provides a decentralized structure to reduce reliance on a single entity but also ensures data authenticity and persistence through its immutable ledger. Moreover, the high transparency of blockchain and the automated execution of smart contracts greatly enhance trust among all participants [8]. For example, in cross-border e-commerce, blockchain technology has wide applications in combating counterfeit goods [9], providing immutable records of transactions [10], enabling secure electronic payments [11], safeguarding the privacy of international business users [12], and integrating with the Internet of Things (IoT) [13]. Blockchain also facilitates information sharing through a distributed network, uses smart contracts to prevent data tampering [14], validates trade documents [15], and provides traceability of supply chain processes to increase transaction transparency [16]. Liu et al. introduced a blockchain-based cross-border e-commerce supply chain framework that employs a multi-chain model to store diverse data and combines RSA and Elliptic Curve Cryptography (ECC) for product information encryption and signing, targeting improved product traceability [17]. Zhao proposed a similar method using SHA-256 and ECC for file encryption and authentication via user ID [12], though lacking support for fine-grained data access control. Singapore’s TradeTrust project integrates blockchain and digital signature technologies, significantly enhancing the authenticity and traceability of shared documents in international trade [15]. The project uses blockchain to generate a unique digital fingerprint (hash value) for each document, recording it on the blockchain to ensure that any tampering with the original document can be detected, thereby improving document authenticity. However, its limitation lies in its ability to only verify whether a document was sent by a specific signer, without ensuring the privacy of the document itself. Wu et al. constructed a model based on blockchain combined with incentives to improve the regulation and data sharing of cross-border logistics in modular construction (CLMC) [18]. This model strengthens CLMC activity supervision and promotes information flow among participants, addressing issues of unclear responsibility, weak data tracking, and insufficient incentive for information exchange. Rahman et al. designed a cross-border data exchange platform with multi-layer secure gateway features, which requires two Elliptic Curve Digital Signature Algorithm (ECDSA) signing and verification steps during each data interaction [19]. Although the platform adopts a “relaxed trust assumption”, meaning it does not fully trust either the data providers or receivers. It still relies on global cloud services as intermediaries, using an audit blockchain at the application layer to validate the secure gateway and enforce penalties. However, this centralized control mechanism may pose a single point of failure risk, and if the global cloud service itself is attacked or behaves maliciously, the security of the entire system will be significantly threatened.
In order to provide a more thorough explanation of the aforementioned scheme, the subsequent example will be employed to illustrate the process of cross-border trade. The exporter and importer establish contract terms and exchange necessary documents (contracts, orders, invoices, packing lists). Exporters prepare some documentation, including commercial invoices, packing lists, origin certificates, and inspection/quarantine certificates, which are submitted to to customs and governmental regulatory authorities for regulatory review. Often, companies struggle to track the status of document reviews, leading to information asymmetry and lack of transparency. Post-audit, the company sends transport documents and insurance policies to the carrier, who delivers the goods to the importing country via international transport. The importer then processes import declarations and collects the goods. This process involves repetitive document transmission.
Facing the complexities of diversified and fine-grained file-sharing among organizations, where single files may require access by multiple entities. During the document-sharing process, only policy-specified authoritative entities participate in document sharing; others may engage in different file exchanges but not in this process. We propose a decentralization MA-ABE scheme that allows each participating entity to freely join and manage the keys. Using IPFS for decentralized storage and integrated with Caterpillar, our solution enforces adherence to predefined processes and offers real-time status transparency, thereby enhancing trust and compliance in customs clearance document exchanges.
The main contributions are summarized as follows:
• We propose a practical MA-ABE scheme that supports proxy decryption, attribute revocation, and policy update. The security proof shows that our MA-ABE scheme is statically secure in the random oracle model. Theoretical analysis and simulation experiments demonstrate that our scheme is highly efficient and practical in terms of proxy decryption and attribute revocation.
• We improve the CTUpdate algorithm for the problem of ciphertext rollback attacks in general attribute revocation mechanisms. In our scheme, the update algorithms must all be operated by attribute privileges, which do not send any update cipher keys to any entity, thus achieving true backward security. While this increases the computational burden of attribute permissions, it strikes a reasonable balance between efficiency and security.
• We propose a Multi-Authority Data Exchange Architecture (MADEXA), which integrates hybrid encryption, MA-ABE, smart contracts, and IPFS. To enhance system decentralization, we implemented a mechanism in the MADEXA scheme where multiple institutions interact with smart contracts and jointly participate in the generation of public parameters.
• We demonstrate the integration of MADEXA with Caterpillar to provide data flow protection for business process management systems. This enables secure sharing of process-oriented data between different departments and enterprises, and enables visualization of the status of data sharing, and real-time monitoring of the clearance status by each participant.
For our security proof, we utilize the q-type assumption over prime-order bilinear groups, specifically referring to the q-DPBDHE2 [20], which is a variant of the q-decisional parallel bilinear Diffie-Hellman exponent assumption presented in [21].
Definition 1
(q-DPBDHE2 Assumption) Select a bilinear group
and this assumption states that no polynomial-time distinguisher can differentiate between the distributions
2.2 Business Process Modeling and Notation
Business Process Modeling and Notation (BPMN) and Decision Model and Notation (DMN) are the most widely used process and decision modeling languages [22]. BPMN defines the symbols and semantics for collaboration diagrams, flowcharts, and processes. It is intended for direct use by stakeholders involved in designing, managing, and implementing business processes, while also being precise enough to allow BPMN diagrams to be converted into software process components. It features easy-to-use, flowchart-like symbols that are independent of any specific implementation environment. In Fig. 1, it shows a BPMN collaboration diagram that illustrates the customs clearance process based on a single window system.

Figure 1: Customs clearance process based on single window
Caterpillar is designed to combine the convenience of Business Process Management System (BPMS) with the security and transparency features of blockchain platforms [23]. Similar to the traditional BPMS, it supports the instantiation of process models and allows users to monitor the status of process instances and perform tasks within them. What sets it apart is the preservation of each process instance’s state on the Ethereum, where workflow management is facilitated by smart contracts produced via a BPMN-to-Solidity compiler. It is particularly suited for cross-organizational processes and is often referred to as “process-centric decentralized applications”. The applications operate among untrusted participants and require ensuring that all parties adhere to predefined process model rules. Caterpillar aims to ensure design compliance, meaning that no party can execute a transaction that violates the collaborative process model.
This paper proposes an enhanced Ciphertext-Policy Multi-Authority Attribute-Based Encryption (CP-MA-ABE) scheme that supports proxy decryption, attribute revocation and policy updates. It builds on the MA-ABE framework by Liu et al. and addresses the inadequacy of the model in resisting user collusion attacks [24]. The proposed improvements are designed to optimise proxy decryption and attribute revocation for practical applications, particularly for users with limited resources.The policy update method is consistent with that of Liu et al.’s scheme [24]. The key symbols utilised in the proposed scheme are listed in Table 1. The subsequent sections provide detailed descriptions of the algorithms.

The ciphertext
Finally, the decrypted message is
For decryption users with limited computational resources, proxy Decryption is an option. This phase comprises three algorithms:
Finally, it generates the partially decrypted ciphertext
When the attribute authority revokes the user’s attribute
In this section, we extend the security model of RW15 by defining a security game between the challenger
The security attribute revocation in ABE should have two security requirements: forward security and backward security. Forward security means that if one or more attributes are revoked and a user’s remaining attributes no longer satisfy the access policy, that user will not be able to access data that was previously accessible using the revoked attributes. Backward security means that if one or more attributes are revoked, then the user will not be able to access subsequent data using the revoked attributes.
Ciphertext rollback attack refers to a scenario where, when updating a ciphertext, a malicious user obtains ciphertext update items from the relevant AA. For example, attribute revocation or policy update. The user rolls back the updated ciphertext to a previous version by using the ciphertext update item. Finally, the malicious user can decrypt the rolled-back ciphertext using the private key of the older version.
The security game proceeds as follows:
•
•
•
•
•
•
•
•
Guess.
Definition 2. We say that an attacker statically breaks the scheme if it has a non negligible advantage in correctly guessing the bit
Throughout the paper, the scenario in Fig. 1 will be consistently referred to. Table 2 provides detailed information on three documents: i) the manufacturer’s purchase order, ii) the international supplier’s export documents–comprising the shipping bill and commercial invoice–which can be merged for efficiency, and iii) customs clearance data from national customs. This integrated design facilitates accessibility for multiple stakeholders, enabling all participants to validate the information’s overall integrity while ensuring decryption access is restricted to intended recipients only.

As shown in Fig. 2, our architecture’s main components consist of the following seven entities:

Figure 2: Interaction between the framework and components of the model
• Certifier Central: It is responsible for deploying smart contracts, assigning user roles, and generating unique global identifiers for each user and authority within the system.
• Data Owner: Responsible for encrypting information, setting access policies, and maintaining a blockchain account along with an RSA key pair.
• Data User: Participants who desire to obtain information, such as that of the manufacturer, customs, and the supplier. The Data user can choose whether to use proxy decryption or not.
• Authority Network: Each Authority is an independent attribute authority. Each Authority can manage any number of attributes, and each attribute is only associated with an Authority.
• Proxy Server: Responsible for providing robust computational support, enabling ciphertext updates and partial decryption for users.
• Smart Contracts: Utilized for the secure storage of resource locators, these contracts are detailed in subsequent sections.
• Data Store: This IPFS-based storage server generates a unique hash for each file based on its content. Utilizing IPFS’s InterPlanetary Naming System (IPNS), it ensures stable and persistent content references by maintaining unaltered access links despite content updates. IPNS is used as the resource locator.
In this section, a detailed introduction to the specific processes of system startup, authority initialization, key management, data sharing, proxy decryption, attribute revolution, and policy update is provided. First, it is assumed that all participants agree on the smart contract code and user roles. The Certifier Central deploys all smart contracts on the blockchain. The Certifier Central assigns participant roles to specific users identified by their blockchain accounts. Each Authority assigned the attributes to the appropriate user. Data users generate RSA key pairs and upload their public keys to the RSA smart contract, which Authorities use to verify identities and transmit attribute keys.
As shown in Algorithm 1, the Initialization phase involves constructing the Authorities network and establishing encryption parameters. To ensure complete decentralization, the public parameter generation procedure for MA-ABE has been redesigned as a Multi-Party Computation protocol. Specifically, a commit-then-open coin-tossing protocol is used to produce a random generator. Each Authority publishes the hash of the locally generated random pairing elements on the blockchain, then reveals these elements themselves, completing the commit-then-open protocol. Each Authority verifies that the hash of the pairing elements matches their revealed values and then processes all revealed values to compute the public parameters, which become part of the public parameters. Each Authority uses the

Key management securely distributes and assembles attribute keys, enabling authorized data users to access encrypted information. As shown in Fig. 3a, it represents the steps of the key management phase, this phase involves the Certifier Central storing user attributes and records of their process participation. For instance, the manufacturer holds the address 0 × 07e

Figure 3: Key management and proxy decryption phases

The process of data sharing is divided into encryption and decryption phases, with Algorithm 2 illustrating the data owner’s encryption procedure. Based on MA-ABE, the data owner establishes an access control policy. Considering that business processes may require encryption of plaintext data of arbitrary size, we employ a two-stage hybrid encryption strategy. The data owner encrypts a randomly generated symmetric key using the
As illustrated in Fig. 3b, the process of proxy encryption involves several key steps. Firstly, the data user generates transformation key and a retrieval key from the attribute key, then transmits the transformation key along with the message ID to the Proxy Server. The Proxy Server retrieves the corresponding message from the Message Contract and Data Store using the message ID and applies the transformation key for partial decryption. It forwards the partially decrypted message to the data user, who completes the decryption process using the retrieval key to obtain the symmetric key, thereby gaining access to the information.
In Algorithm 3, it describes the process of attribute revocation in MADEXA. The policy update process in MADEXA can be obtained through the Algorithm 4. In their algorithm, “link” refers to the content identifier (CID) used for rebinding in IPNS.


In Table 2, it presents the format of messages that are encrypted and stored in the Data Store. Each storage entry is composed of one or more slices, designed to meet the access needs of different participants. Each file consists of metadata and a body. The metadata contains the sender, process id, and unique message id, while the body contains encrypted key-value pair data for easy indexing and retrieval, with each slice identified by a unique slice id. The sender corresponds to the user’s ethereum address and is used to identify the sender of the message. The process id and message id are fixed-length random numbers generated by the entity to uniquely identify each process and message instance. Key corresponds to the symmetric key that has been encrypted using MA-ABE, and Fields indicates the JSON-formatted data encrypted by the above symmetric key. We achieve finer-grained access control management by setting access policies on message slices. The messages are stored in the Data Store, retrievable via resource locators, and their integrity and authenticity are verified through hashing.
Our main security theorem is shown below:
Theorem 1
If the architecture proposed by RW15 maintains static security under q-DPBDHE2 assumptions in the random oracle model, then all probabilistic polynomial-time (PPT) adversaries attempting to statically break our scheme within this model will have a negligible success probability.
Proof. Suppose there exists a PPT adversary capable of compromising our scheme with a non-negligible advantage
Guess
If the adversary
Theorem 2
Our proposed scheme is secure against user collusion attacks.
Proof. When an attribute
Theorem 3
Our attribute revocation enables forward and backward security.
Proof. When attribute x is revoked from a data user uid, all relevant ciphertexts are re-encrypted by the authority according to
Theorem 4
Our scheme is resistant to ciphertext rollback attacks.
Proof. Our plan involves updating ciphertext through attribute revocation and policy update. When updating ciphertext, our strategy is not to give any ciphertext update items to any other entity. In attribute revocation, AA does not provide ciphertext update items to any other entity, while in policy update, users do not provide them. By way, the attacker cannot roll back the updated ciphertext to its previous state. □
In Table 3, we compare our scheme with various MA-CP-ABE schemes. The GLGL23 [25] employs an access tree structure, while the proposed scheme and others use LSSS structures. The GLGL23 and ZLWR24 support user-level attribute revocation, while our scheme and others implement attribute-level revocation. The schemes [24–27] are susceptible to collusion attacks. The LJ18 [24] direct transmission of attribute group keys from AA to users can lead to adversaries obtaining revoked keys. Additionally, the scheme [24–28] are vulnerable to ciphertext rollback attacks, where adversary may exploit cloud-obtained update items to compromise backward security. In contrast, our scheme and ZHZL22 [29] conduct all ciphertext updates independently by AA without delegating update items to the cloud. Furthermore, CBZ22 [26], GLGL23 [25], and GWZ23 [27] exhibit significant security flaws, potentially allowing malicious entities to obtain plaintext.
In the CBZ22 scheme, a critical security flaw occurs during the Online.Enc phase, where parameters
In Table 4, we present a comparative analysis of computational complexities between our scheme and other studies. Here,

The performance of the proposed scheme was assessed by the Charm1. The experiments utilized a super singular symmetric elliptic curve group(“SS512”), which is defined over a 512-bit base field. The experiments were run on a VMware® Workstation 15 Pro virtual machine platform, which was configured with a 2.60 GHz Intel Core processor, 2.0 GB of memory, and a 64-bit Linux Ubuntu 16 operating system. The findings from all experiments are calculated as the mean of 10 separate runs.
As shown in Fig. 4a–c, the efficiency of proxy decryption is primarily explored. For this experiment, the system included 4 AAs, and the number of attributes per AA was increased according to the encryption policy. In Fig. 4a, our

Figure 4: Experimental performance of proxy decryption in our scheme. (a) Running time of
For proxy decryption, the handled key and ciphertext constitute the main communication overhead. In Table 5, it shows the communication overhead comparison of


In Fig. 5, it shows the time consumption under different numbers of revoked attributes. As shown in Fig. 5b, the execution time of the LJ18 scheme’s

Figure 5: Experimental performance of attribute revocation in our scheme. (a) Running time of
6.3 Integrate with Process Execution Engine
In the Ethereum protocol, the cost of executing or deploying a smart contract is measured in gas, reflecting the number of opcodes invoked [31]. We use ganache to simulate the merged version of Ethereum. The version used for Smart Contract is


As illustrated in Table 7, four stages were evaluated: smart contract deployment, system startup, authority initialization, and data sharing. Specifically, smart contract deployment consumes the most gas at 2,357,360 units, approximately $49. In the long run, this cost will be amortized, as the smart contract will continue to be used for future similar scenarios. System startup and authority initialization consume 299,231 gas units ($6.2) and 473,516 gas units ($9.8), respectively, with both being one-time costs. Data sharing incurs a cost of 89,420 gas units ($1.80) per file, also a one-time expense. The results indicate that the average gas consumption across these stages is relatively low.

We integrated MADEXA with Caterpillar v1.02, serving as its data management layer to enhance secure data storage. As depicted in Fig. 6, the experimental results from the previous scenario are illustrated, the right side corresponds to the process of data sharing for MADEXA integration with Caterpillar. Specifically, the BPMN corresponding to the Single Window process depicted in Fig. 1 is uploaded to Caterpillar, which then converts it into a smart contract to be uploaded to Ethereum. The data sharing of the entire process is then visualised. Users input data through Caterpillar’s interface and mark it with the prefix “@MAABE:” to indicate that they wish to encrypt the information with MAABE. This example focuses on the transmission of customs clearance data by international suppliers to customs authorities, specifically the order information in the export documents listed in Table 2. After encryption, the first parameter remains unchanged, while the second is replaced by an IPFS link. Consequently, the execution engine logs the resource locator on the blockchain for audit purposes. The process outlined enables the maintenance of each customs clearance process instance on the ethereum, the execution of workflow routing through smart contracts, and the real-time monitoring of the process state by all participants, thereby facilitating on-chain data sharing and visualisation.

Figure 6: Integration with Caterpillar
This paper presents an attribute-based multi-authoritative data exchange architecture and integrates it with a process execution engine, which aims to address the challenges associated with cross-border trade data sharing. The architecture provides fine-grained data access control management for cross-border trade and supports proxy decryption, attribute revocation, and policy update. The proposed scheme ensures the security and visibility of cross-border trade data-sharing processes, effectively overcoming the challenges of effective sharing and trust in traditional cross-border trade information systems. We conducted a thorough discussion and provided a formal demonstration of the security aspects of our scheme. Through detailed performance analysis and simulation experiments, the superiority and feasibility of the proposed scheme in real-world application scenarios are demonstrated, effectively balancing security requirements and operational efficiency.
In our approach, we have identified several limitations that need to be addressed in future research. The user attribute keys are currently generated by an authoritative entity, which raises concerns regarding key management. We envision propose a more decentralized approach to generating attribute keys, wherein users collaborate with one or more trusted third parties in the key generation process, using techniques like zero-knowledge proofs or secure multi-party computation to ensure security [25]. This design realizes the paradigm of self-sovereign keys [32]. Although the current research focuses more on the theoretical aspect, aiming to provide a reference framework for cross-border trade data sharing, in future practical applications, we will need to consider the performance and applicability in different blockchain environments, as well as the system scalability under large-scale users and high-concurrency access.
Acknowledgement: The authors would like to express special thanks to the collaborators for their valuable insights and discussions in completing this review.
Funding Statement: This work is supported by Hainan Provincial Natural Science Foundation of China Nos. 622RC617, 624RC485. Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (SKLNST-2023-1-07).
Author Contributions: Shenjian Xiao: Conceptualization, Methodology, Validation, Formal analysis, Investigation, Resources, Writing—original draft, Visualization. Xiaoli Qin: Supervision, Methodology, Funding acquisition, Writing—original draft. Yanzhao Tian: Supervision, Conceptualization, Methodology, Project administration, Writing—review & editing, Funding acquisition. Zhongkai Dang: Editing, Polishing, Conceptualization. All authors reviewed the results and approved the final version of the manuscript.
Availability of Data and Materials: The authors confirm that the data supporting the findings of this study are available within the article.
Ethics Approval: This study did not involve any human or animal subjects, and therefore, ethical approval was not required.
Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.
1https://github.com/JHUISI/charm (accessed on 27 January 2025)
2https://github.com/orlenyslp/Caterpillar (accessed on 27 January 2025)
References
1. Chang YL, Iakovou E, Shi WD. Blockchain in global supply chains and cross border trade: a critical synthesis of the state-of-the-art, challenges and opportunities. Int J Prod Res. 2020 Apr;58(7):2082–99. doi:10.1080/00207543.2019.1651946. [Google Scholar] [CrossRef]
2. Du RQ, Duval Y. An exploration of paperless trade implementation in UN and other international conventions involving cross-border exchange of trade-related data and documents. In: UNNExT working paper series no. 10. Bangkok: ESCAP; 2024 Jun. [Google Scholar]
3. Castellani L, Ramirez Ortiz CM. Driving digitalization of global trade: UNCITRAL model law on electronic transferable records. Manila, Philippines: Asian Development Bank; 2023. [Google Scholar]
4. Casanova D, Dierker D, Hausmann L, Jensen B, Stoffels J. The multi-billion-dollar paper jam: unlocking trade by digitalizing documentation. McKinsey’s Travel, Logist Infrastruct Practice. 2022;1–8. [cited 2024 Jun 1]. Available from: https://www.mckinsey.com/industries/logistics/our-insights/the-multi-billion-dollar-paper-jam-unlocking-trade-by-digitalizing-documentation. [Google Scholar]
5. Chen TW, Yu YM, Duan ZT. Data access & sharing approach for trade documentations based on blockchain technology. In: 2019 3rd International Conference on Electronic Information Technology and ComputerEngineering (EITCE); 2019 Oct; IEEE. p. 1732–6. [Google Scholar]
6. Bondarenko A. Advancing the digitalization of trade supporting documents in the Eurasian Economic Union member States and beyond. In: UNNExT working paper series no. 3. Bangkok: ESCAP; 2023 Sep. [Google Scholar]
7. Sarker S, Henningsson S, Jensen T, Hedman J. The use of blockchain as a resource for combating corruption in global shipping: aan interpretive case study. J Manag Inf Syst. 2021 Apr;38(2):338–73. doi:10.1080/07421222.2021.1912919. [Google Scholar] [CrossRef]
8. World Trade Organization. Securing cross-border trade through advanced technologies. WTO; 2022 Mar. p. 4–9. [cited 2024 Jun 1]. Available from: https://www.wto-ilibrary.org/content/books/9789287071002c002. [Google Scholar]
9. Lee H, Yeon C. Blockchain-based traceability for anti-counterfeit in cross-border e-commerce transactions. Sustainability. 2021 Jan;13(19):11057. doi:10.3390/su131911057. [Google Scholar] [CrossRef]
10. Zhang XM, Zha XY, Zhang HY, Dan B. Information sharing in a cross-border e-commerce supply chain under tax uncertainty. Int J Electron Commer. 2022 Jan;26(1):123–46. doi:10.1080/10864415.2021.2010007. [Google Scholar] [CrossRef]
11. Theodouli A, Manganopoulou E, Kalfoutzos A, Tzikas A, Tsislianis C, Ioannidis D, et al. Towards a secure and transparent blockchain-based system for e-commerce deliveries. In: Manulis M, Maimuţ D, Teşeleanu G, editors. Innovative security solutions for information technology and communications. Cham: Springer Nature Switzerland; 2024. p. 113–25. [Google Scholar]
12. Zhao HM. A cross-border e-commerce approach based on blockchain technology. Mob Inf Syst. 2021;2021(1):2006082. doi:10.1155/2021/2006082. [Google Scholar] [CrossRef]
13. Hazarika B, Mousavi R. Review of cross-border e-commerce and directions for future research. J Glob Inf Manag. 2022 Jan;30(2):1–18. [Google Scholar]
14. Thoppae C, Praneetpolgrang P. An analysis of a blockchain-enabled e-government document interchange architecture (DIA) in Thailand. TEM J. 2021 Aug;10(3):1220–7. doi:10.18421/TEM. [Google Scholar] [CrossRef]
15. Singapore’s Infocomm Media Development Authority (IMDA). TradeTrust-digitised global trade. [cited 2024 Jun 1]. Available from: https://www.tradetrust.io/. [Google Scholar]
16. Singapore Together Alliance for Action (AfA). Singapore Trade Data Exchange (SGTraDex). [cited 2025 Feb 14]. Available from: https://sgtradex.com/. [Google Scholar]
17. Liu ZY, Li ZP. A blockchain-based framework of cross-border e-commerce supply chain. Int J Inf Manag. 2020;52(10):102059. doi:10.1016/j.ijinfomgt.2019.102059. [Google Scholar] [CrossRef]
18. Wu LPF, Li X, Zhao R, Lu WS, Xu JY, Xue F. A blockchain-based model with an incentive mechanism for cross-border logistics supervision and data sharing in modular construction. J Clean Prod. 2022;375(7):133460. doi:10.1016/j.jclepro.2022.133460. [Google Scholar] [CrossRef]
19. Rahman SM, Al Omar A, Bhuiyan MZA, Basu A, Kiyomoto S, Wang G. Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Trans Eng Manag. 2020;67(4):1476–86. doi:10.1109/TEM.2019.2960829. [Google Scholar] [CrossRef]
20. Rouselakis Y, Waters B. Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Okamoto T, editor. International Conference on Financial Cryptography and Data Security. Berlin/Heidelberg: Springer; 2015. p. 315–32. [Google Scholar]
21. Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D, Fazio N, Gennaro R, Nicolosi A, editors. Public key cryptography–PKC 2011. Berlin/Heidelberg: Springer; 2011. p. 53–70. [Google Scholar]
22. Chinosi M, Trombetta A. BPMN: an introduction to the standard. Comput Stand Interfaces. 2012;34(1):124–34. doi:10.1016/j.csi.2011.06.002. [Google Scholar] [CrossRef]
23. López-Pintado O, García-Bañuelos L, Dumas M, Weber I, Ponomarev A. Caterpillar: a business process execution engine on the ethereum blockchain. Softw: Pract Exp. 2019 Jul;49(7):1162–93. doi:10.1002/spe.2702. [Google Scholar] [CrossRef]
24. Liu ZC, Jiang ZL, Wang X, Yiu SM. Practical attribute-based encryption: outsourcing decryption, attribute revocation and policy updating. J Netw Comput Appl. 2018 Apr;108:112–23. [Google Scholar]
25. Guo YY, Lu ZH, Ge H, Li JG. Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage. IEEE Trans Comput. 2023;72(7):1901–12. [Google Scholar]
26. Cui J, Bian F, Zhong H, Zhang Q, Xu S, Gu C, et al. An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system. IEEE Syst J. 2022;16(4):6569–80. [Google Scholar]
27. Guo ZZ, Wang GL, Zhang GY, Li YX, Ni JQ. A multifactor combined data sharing scheme for vehicular fog computing using blockchain. IEEE Internet Things J. 2023;10(22):20049–64. [Google Scholar]
28. Huang KQ. Secure efficient revocable large universe multi-authority attribute-based encryption for cloud-aided IoT. IEEE Access. 2021;9:53576–88. doi:10.1109/ACCESS.2021.3070907. [Google Scholar] [CrossRef]
29. Zhang ZS, Huang W, Zhou SJ, Liao YJ. A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing. J Syst Archit. 2022;129(2):102589. doi:10.1016/j.sysarc.2022.102589. [Google Scholar] [CrossRef]
30. Zhang LY, Li XM, Wu Q, Rezaeibagha F. Blockchain-aided anonymous traceable and revocable access control scheme with dynamic policy updating for the cloud IoT. IEEE Internet Things J. 2024;11(1):526–42. doi:10.1109/JIOT.2023.3287190. [Google Scholar] [CrossRef]
31. Wood G. Ethereum: a secure decentralised generalised transaction ledger. Vol. 151. In: Ethereum project yellow paper; 2014. p. 1–32. [Google Scholar]
32. Di Francesco Maesa D, Lisi A, Mori P, Ricci L, Boschi G. Self sovereign and blockchain based access control: supporting attributes privacy with zero knowledge. J Netw Comput Appl. 2023;212(6):103577. doi:10.1016/j.jnca.2022.103577. [Google Scholar] [CrossRef]
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools