2021
DOI: 10.1155/2021/2006082
|View full text |Cite
|
Sign up to set email alerts
|

A Cross-Border E-Commerce Approach Based on Blockchain Technology

Abstract: In the current cross-border electronic commerce (e-commerce) system, various document recording and authorization processes are cumbersome, record sharing efficiency is low, and identity verification is difficult. A method of asymmetric encryption technology combining Blockchain technology and cryptography is proposed. The advantages of asymmetric encrypted communications include high security and ease of multiparties communication collaboration, being applied to a peer-to-peer network formed by Blockchain tec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…Information placed on the distributed network is validated and de-identified. Once the file is uploaded and verified, it will not be affected [ 9 ]. Each block contains the following information shown in Table 1 .…”
Section: Introduction Of Blockchain Technology and The Related Techno...mentioning
confidence: 99%
“…Information placed on the distributed network is validated and de-identified. Once the file is uploaded and verified, it will not be affected [ 9 ]. Each block contains the following information shown in Table 1 .…”
Section: Introduction Of Blockchain Technology and The Related Techno...mentioning
confidence: 99%
“…Second, without the aid of a third-party notary institution, unauthorized users can be safely filtered thanks to the design of the cross-domain acquisition contract, which successfully verifies the identity and data-sharing efficiency of both sides. The findings of the simulation experiment demonstrate that the solution suggested in this work by Zhao Hongmei (2021) has clear advantages over conventional cloud computing approaches in terms of data antitheft, multiparty authentication, and reducing system overhead [25]. It offers a guide for how to use the decentralization and auditability of Blockchain to solve security issues in the data sharing process.…”
Section: Literature Reviewmentioning
confidence: 75%
“…They created a mechanism to safeguard privacy in e-commerce systems with blockchain technology. The researchers use zk-SNARKs, a cryptographic approach for securing user identities and validating ownership [11].…”
Section: Literature Surveymentioning
confidence: 99%