Blockchain-Based TraditionalWeaving Certification and Elliptic Curve Digital Signature
Abstract
Traditional weaving in West Nusa Tenggara was essential to the region’s cultural heritage. Many local micro, small, and medium enterprises continued to practice traditional weaving using natural materials. However, the rise of synthetic materials threatened this tradition, making distinguishing between natural and synthetic woven fabrics difficult. This study aimed to develop a blockchain-based self-certification system to enhance traceability, security, and efficiency using Non-Fungible Tokens. The research method leveraged the Elliptic Curve Digital Signature Algorithm for user authentication and smart contracts to mint Non-Fungible Tokens, ensuring the authenticity and origin of each product.
Each product’s metadata was signed with a digital signature that anyone could authenticate, and the outcome and the product metadata became a certificate. This study resulted in a web prototype with an easy-to-use interface that allowed artisans to create certificates and sell their registered works. This solution aimed to ensure the authenticity of traditional woven products by offering secure and transparent blockchain technology.
Downloads
References
Impresi Indonesia, vol. 3, no. 2, pp. 128–138, Feb. 2024, https://doi.org/10.58344/jii.v3i2.4636.
[2] D. Rahayu and F. Yanis, “Tourism Communication Model Based on Local Wisdom on Lombok Island, West Nusa Tenggara,”
Eduvest - Journal of Universal Studies, vol. 3, no. 9, pp. 1608–1616, Sep. 2023, https://doi.org/10.59188/eduvest.v3i9.883.
[3] I. Afrianto, A. Heryandi, and S. Atin, “Blockchain-based Trust, Transparent, Traceable Modeling on Learning Recognition
System Kampus Merdeka,” MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 22, no. 2, pp.
339–352, Mar. 2023, https://doi.org/10.30812/matrik.v22i2.2780.
[4] J. Lin, W. Long, A. Zhang, and Y. Chai, “Blockchain and IoT-based architecture design for intellectual property protection,”
International Journal of Crowd Science, vol. 4, no. 3, pp. 283–293, Jun. 2020, https://doi.org/10.1108/IJCS-03-2020-0007.
[5] S. Ruoti, B. Kaiser, A. Yerukhimovich, J. Clark, and R. Cunningham, “Blockchain technology: what is it good for?”
Communications of the ACM, vol. 63, no. 1, pp. 46–53, Dec. 2019, https://doi.org/10.1145/3369752.
[6] I. Afrianto, T. Djatna, Y. Arkeman, I. Sukaesih Sitanggang, and I. Hermadi, “Disrupting Agro-industry Supply
Chain in Indonesia With Blockchain Technology: Current and Future Challenges,” in 2020 8th International
Conference on Cyber and IT Service Management (CITSM). Pangkal Pinang, Indonesia: IEEE, Oct. 2020, pp. 1–6,
https://doi.org/10.1109/CITSM50537.2020.9268872.
[7] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, “Blockchain-Enabled Smart Contracts: Architecture,
Applications, and Future Trends,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 11, pp.
2266–2277, Nov. 2019, https://doi.org/10.1109/TSMC.2019.2895123.
[8] A. Pereira, P. Ferreira, and D. Quintino, “Non-Fungible Tokens (NFTs) and Cryptocurrencies: Efficiency and Comovements,”
FinTech, vol. 1, no. 4, pp. 310–317, Oct. 2022, https://doi.org/10.3390/fintech1040023.
[9] T. V. Doan, Y. Psaras, J. Ott, and V. Bajpai, “Toward Decentralized Cloud Storage With IPFS: Opportunities,
Challenges, and Future Considerations,” IEEE Internet Computing, vol. 26, no. 6, pp. 7–15, Nov. 2022, https:
//doi.org/10.1109/MIC.2022.3209804.
[10] M. Alizadeh, K. Andersson, and O. Schelen, “Efficient Decentralized Data Storage Based on Public Blockchain and IPFS,” in
2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). Gold Coast, Australia: IEEE, Dec.
2020, pp. 1–8, https://doi.org/10.1109/CSDE50874.2020.9411599.
[11] Y.-J. Su, C.-H. Chen, T.-Y. Chen, and C.-W. Yeah, “Applying Ethereum blockchain and IPFS to construct a
multi-party used-car trading and management system,” ICT Express, vol. 10, no. 2, pp. 306–311, Apr. 2024,
https://doi.org/10.1016/j.icte.2023.12.007.
[12] A. K. Rai, M. Singh, H. C. Sudheendramouli, V. Panwar, N. A. Balaji, and R. Kukreti, “Digital Signature for Content
Authentication,” in 2023 International Conference on Advances in Computing, Communication and Applied Informatics
(ACCAI). Chennai, India: IEEE, May 2023, pp. 1–6, https://doi.org/10.1109/ACCAI58221.2023.10200472.
[13] Z. Wu, R. Liu, and H. Cao, “ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite
System,” IEEE Transactions on Aerospace and Electronic Systems, vol. 55, no. 4, pp. 1666–1682, Aug. 2019,
https://doi.org/10.1109/TAES.2018.2874151.
[14] J. Doerner, Y. Kondi, E. Lee, and A. Shelat, “Threshold ECDSA from ECDSA Assumptions: The Multiparty Case,”
in 2019 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA: IEEE, May 2019, pp. 1051–1066,
https://doi.org/10.1109/SP.2019.00024.
[15] H. R. Hasan, M. Madine, I. Yaqoob, K. Salah, R. Jayaraman, and D. Boscovic, “Using NFTs for ownership management of
digital twins and for proof of delivery of their physical assets,” Future Generation Computer Systems, vol. 146, pp. 1–17, Sep.
2023, https://doi.org/10.1016/j.future.2023.03.047.
[16] G. Cruz, T. Guimar˜aes, M. F. Santos, and J. Machado, “Decentralize Healthcare Marketplace,” Procedia Computer Science,
vol. 231, pp. 439–444, 2024, https://doi.org/10.1016/j.procs.2023.12.231.
[17] A. Jamal, R. A. A. Helmi, A. S. N. Syahirah, and M.-A. Fatima, “Blockchain-Based Identity Verification System,” in 2019
IEEE 9th International Conference on System Engineering and Technology (ICSET). Shah Alam, Malaysia: IEEE, Oct. 2019,
pp. 253–257, https://doi.org/10.1109/ICSEngT.2019.8906403.
[18] M. K. Pawar, P. Patil, R. Sawhney, P. Gumathanavar, S. Hegde, and K. Maremmagol, “Performance Analysis of E-Certificate
Generation and Verification using Blockchain and IPFS,” in 2022 International Conference on Inventive Computation
Technologies (ICICT). Nepal: IEEE, Jul. 2022, pp. 345–350, https://doi.org/10.1109/ICICT54344.2022.9850830.
[19] C. Chen, Y. Li, Z. Wu, M. Xu, R. Wang, and Z. Zheng, “Towards Reliable Utilization of AIGC: Blockchain-Empowered
Ownership Verification Mechanism,” IEEE Open Journal of the Computer Society, vol. 4, pp. 326–337, 2023,
https://doi.org/10.1109/OJCS.2023.3315835.
[20] C. Negru, G. Musat, M. Colezea, C. Anghel, A. Dumitrascu, F. Pop, C. De Maio, and A. Castiglione, “Dependable
workflow management system for smart farms,” Connection Science, vol. 34, no. 1, pp. 1833–1854, Dec. 2022,
https://doi.org/10.1080/09540091.2022.2083078.
[21] A. Ghofar, M. Hardi, M. N. Firdaus, and G. F. Shidik, “Digital signature based on PlayGamal algorithm,” in 2017 International
Seminar on Application for Technology of Information and Communication (iSemantic). Semarang: IEEE, Oct. 2017, pp.
58–65, https://doi.org/10.1109/ISEMANTIC.2017.8251844.
[22] M. A. Kosim, S. R. Aji, and M. Darwis, “Pengujian Usability Aplikasi Pedulilindungi dengan Metode System
Usability Scale (SUS),” Jurnal Sistem Informasi dan Sains Teknologi, vol. 4, no. 2, pp. 1–7, Aug. 2022,
https://doi.org/10.31326/sistek.v4i2.1326.
[11] K. Marzuki, A. Anggrawan, H. Wardhana, L. G. Rady Putra, and C. W. Rinaldi, “Design of Field Rental System on Web-Based
Garuda Mataram Badminton Club,” Jurnal Teknik Informatika, vol. 16, no. 1, pp. 58–68, 2023.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.