Blockchain-Based TraditionalWeaving Certification and Elliptic Curve Digital Signature
DOI:
https://doi.org/10.30812/matrik.v24i1.4337Keywords:
Blockchain, Digital Signature, E-Certificate, Non-Fungible TokenAbstract
Traditional weaving in West Nusa Tenggara was essential to the region’s cultural heritage. Many local micro, small, and medium enterprises continued to practice traditional weaving using natural materials. However, the rise of synthetic materials threatened this tradition, making distinguishing between natural and synthetic woven fabrics difficult. This study aimed to develop a blockchain-based self-certification system to enhance traceability, security, and efficiency using Non-Fungible Tokens. The research method leveraged the Elliptic Curve Digital Signature Algorithm for user authentication and smart contracts to mint Non-Fungible Tokens, ensuring the authenticity and origin of each product.
Each product’s metadata was signed with a digital signature that anyone could authenticate, and the outcome and the product metadata became a certificate. This study resulted in a web prototype with an easy-to-use interface that allowed artisans to create certificates and sell their registered works. This solution aimed to ensure the authenticity of traditional woven products by offering secure and transparent blockchain technology.
Downloads
References
Impresi Indonesia, vol. 3, no. 2, pp. 128–138, Feb. 2024, https://doi.org/10.58344/jii.v3i2.4636.
[2] D. Rahayu and F. Yanis, “Tourism Communication Model Based on Local Wisdom on Lombok Island, West Nusa Tenggara,â€
Eduvest - Journal of Universal Studies, vol. 3, no. 9, pp. 1608–1616, Sep. 2023, https://doi.org/10.59188/eduvest.v3i9.883.
[3] I. Afrianto, A. Heryandi, and S. Atin, “Blockchain-based Trust, Transparent, Traceable Modeling on Learning Recognition
System Kampus Merdeka,†MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 22, no. 2, pp.
339–352, Mar. 2023, https://doi.org/10.30812/matrik.v22i2.2780.
[4] J. Lin, W. Long, A. Zhang, and Y. Chai, “Blockchain and IoT-based architecture design for intellectual property protection,â€
International Journal of Crowd Science, vol. 4, no. 3, pp. 283–293, Jun. 2020, https://doi.org/10.1108/IJCS-03-2020-0007.
[5] S. Ruoti, B. Kaiser, A. Yerukhimovich, J. Clark, and R. Cunningham, “Blockchain technology: what is it good for?â€
Communications of the ACM, vol. 63, no. 1, pp. 46–53, Dec. 2019, https://doi.org/10.1145/3369752.
[6] I. Afrianto, T. Djatna, Y. Arkeman, I. Sukaesih Sitanggang, and I. Hermadi, “Disrupting Agro-industry Supply
Chain in Indonesia With Blockchain Technology: Current and Future Challenges,†in 2020 8th International
Conference on Cyber and IT Service Management (CITSM). Pangkal Pinang, Indonesia: IEEE, Oct. 2020, pp. 1–6,
https://doi.org/10.1109/CITSM50537.2020.9268872.
[7] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.-Y. Wang, “Blockchain-Enabled Smart Contracts: Architecture,
Applications, and Future Trends,†IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 11, pp.
2266–2277, Nov. 2019, https://doi.org/10.1109/TSMC.2019.2895123.
[8] A. Pereira, P. Ferreira, and D. Quintino, “Non-Fungible Tokens (NFTs) and Cryptocurrencies: Efficiency and Comovements,â€
FinTech, vol. 1, no. 4, pp. 310–317, Oct. 2022, https://doi.org/10.3390/fintech1040023.
[9] T. V. Doan, Y. Psaras, J. Ott, and V. Bajpai, “Toward Decentralized Cloud Storage With IPFS: Opportunities,
Challenges, and Future Considerations,†IEEE Internet Computing, vol. 26, no. 6, pp. 7–15, Nov. 2022, https:
//doi.org/10.1109/MIC.2022.3209804.
[10] M. Alizadeh, K. Andersson, and O. Schelen, “Efficient Decentralized Data Storage Based on Public Blockchain and IPFS,†in
2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE). Gold Coast, Australia: IEEE, Dec.
2020, pp. 1–8, https://doi.org/10.1109/CSDE50874.2020.9411599.
[11] Y.-J. Su, C.-H. Chen, T.-Y. Chen, and C.-W. Yeah, “Applying Ethereum blockchain and IPFS to construct a
multi-party used-car trading and management system,†ICT Express, vol. 10, no. 2, pp. 306–311, Apr. 2024,
https://doi.org/10.1016/j.icte.2023.12.007.
[12] A. K. Rai, M. Singh, H. C. Sudheendramouli, V. Panwar, N. A. Balaji, and R. Kukreti, “Digital Signature for Content
Authentication,†in 2023 International Conference on Advances in Computing, Communication and Applied Informatics
(ACCAI). Chennai, India: IEEE, May 2023, pp. 1–6, https://doi.org/10.1109/ACCAI58221.2023.10200472.
[13] Z. Wu, R. Liu, and H. Cao, “ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite
System,†IEEE Transactions on Aerospace and Electronic Systems, vol. 55, no. 4, pp. 1666–1682, Aug. 2019,
https://doi.org/10.1109/TAES.2018.2874151.
[14] J. Doerner, Y. Kondi, E. Lee, and A. Shelat, “Threshold ECDSA from ECDSA Assumptions: The Multiparty Case,â€
in 2019 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA: IEEE, May 2019, pp. 1051–1066,
https://doi.org/10.1109/SP.2019.00024.
[15] H. R. Hasan, M. Madine, I. Yaqoob, K. Salah, R. Jayaraman, and D. Boscovic, “Using NFTs for ownership management of
digital twins and for proof of delivery of their physical assets,†Future Generation Computer Systems, vol. 146, pp. 1–17, Sep.
2023, https://doi.org/10.1016/j.future.2023.03.047.
[16] G. Cruz, T. Guimar˜aes, M. F. Santos, and J. Machado, “Decentralize Healthcare Marketplace,†Procedia Computer Science,
vol. 231, pp. 439–444, 2024, https://doi.org/10.1016/j.procs.2023.12.231.
[17] A. Jamal, R. A. A. Helmi, A. S. N. Syahirah, and M.-A. Fatima, “Blockchain-Based Identity Verification System,†in 2019
IEEE 9th International Conference on System Engineering and Technology (ICSET). Shah Alam, Malaysia: IEEE, Oct. 2019,
pp. 253–257, https://doi.org/10.1109/ICSEngT.2019.8906403.
[18] M. K. Pawar, P. Patil, R. Sawhney, P. Gumathanavar, S. Hegde, and K. Maremmagol, “Performance Analysis of E-Certificate
Generation and Verification using Blockchain and IPFS,†in 2022 International Conference on Inventive Computation
Technologies (ICICT). Nepal: IEEE, Jul. 2022, pp. 345–350, https://doi.org/10.1109/ICICT54344.2022.9850830.
[19] C. Chen, Y. Li, Z. Wu, M. Xu, R. Wang, and Z. Zheng, “Towards Reliable Utilization of AIGC: Blockchain-Empowered
Ownership Verification Mechanism,†IEEE Open Journal of the Computer Society, vol. 4, pp. 326–337, 2023,
https://doi.org/10.1109/OJCS.2023.3315835.
[20] C. Negru, G. Musat, M. Colezea, C. Anghel, A. Dumitrascu, F. Pop, C. De Maio, and A. Castiglione, “Dependable
workflow management system for smart farms,†Connection Science, vol. 34, no. 1, pp. 1833–1854, Dec. 2022,
https://doi.org/10.1080/09540091.2022.2083078.
[21] A. Ghofar, M. Hardi, M. N. Firdaus, and G. F. Shidik, “Digital signature based on PlayGamal algorithm,†in 2017 International
Seminar on Application for Technology of Information and Communication (iSemantic). Semarang: IEEE, Oct. 2017, pp.
58–65, https://doi.org/10.1109/ISEMANTIC.2017.8251844.
[22] M. A. Kosim, S. R. Aji, and M. Darwis, “Pengujian Usability Aplikasi Pedulilindungi dengan Metode System
Usability Scale (SUS),†Jurnal Sistem Informasi dan Sains Teknologi, vol. 4, no. 2, pp. 1–7, Aug. 2022,
https://doi.org/10.31326/sistek.v4i2.1326.
[11] K. Marzuki, A. Anggrawan, H. Wardhana, L. G. Rady Putra, and C. W. Rinaldi, “Design of Field Rental System on Web-Based
Garuda Mataram Badminton Club,†Jurnal Teknik Informatika, vol. 16, no. 1, pp. 58–68, 2023.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Siti Ummi Masruroh, Andrew Fiade, Muhammad Ikhsan Tanggok, Rizka Amalia Putri, Luigi Ajeng Pratiwi, Convolutional Neural Network for Colorization of Black and White Photos , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Herman Kabetta, Hermawan Setiawan, Fetty Amelia, Muhammad Qolby Fawzan, Seamless Security on Mobile Devices Textual Password Quantification Model Based Usability Evaluation of Secure Rotary Entry Pad Authentication , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Muhammad Alkaff, Muhammad Afrizal Miqdad, Muhammad Fachrurrazi, Muhammad Nur Abdi, Ahmad Zainul Abidin, Raisa Amalia, Hate Speech Detection for Banjarese Languages on Instagram Using Machine Learning Methods , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Yana Safitri, Imam Riadi, Sunardi Sunardi, Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Matrissya Hermita, Budi Hermana, Suryadi Harmanto, Adang Suhendra, Munawir Pasaribu, Social Media Engagement and Student’s Intention in Indonesian Higher Education Using Unified Theory of Acceptance and Use of Technology , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Ahmad Homaidi, Lukman Fakih Lidimilah, Jarot Dwi Prasetyo, Nur Azizah, Employee Presence and Payroll Information System Using Quick Response Code and Geolocation , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Heru Pramono Hadi, Eko Hari Rachmawanto, Rabei Raad Ali, Comparison of DenseNet-121 and MobileNet for Coral Reef Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Achmad Lukman, Wahju Tjahjo Saputro, Erni Seniwati, Improving Performance Convolutional Neural Networks Using Modified Pooling Function , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Putri Jafar, Dolly Indra, Fitriyani Umar, Color Feature Extraction for Grape Variety Identification: Naïve Bayes Approach , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Egi Dio Bagus Sudewo, Muhammad Kunta Biddinika, Abdul Fadlil, DenseNet Architecture for Efficient and Accurate Recognition of Javanese Script Hanacaraka Character , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Ahmad Fatoni Dwi Putra, Muhamad Nizam Azmi, Heri Wijayanto, Satria Utama, I Gede Putu Wirarama Wedashwara Wirawan, Optimizing Rain Prediction Model Using Random Forest and Grid Search Cross-Validation for Agriculture Sector , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)