Traceability via blockchain anchoring

Frank Hillard
January 3, 2024
Web3

This article aims to introduce the concept of information traceability. We will see how the publication of fingerprints on a blockchain can create trust among all participants and ensure a consensus on the veracity and authenticity of the information.

1 - Fingerprints Bring Proof of Trust

Traceability implies knowing the state of an information system and tracking the evolution of its states. The goal is to provide accessibility to certain states that the system passes through for all participants who need to verify the authenticity of the information.

Trust between users is achieved through the publication of proofs, fingerprints indicating that information is known, called existence proofs. These fingerprints can also be cryptographically signed by the user who emits them. This allows specifying which user knew data in the past (without disclosing the information). Thus, the entire system allows tracing the information and its subsequent verification by all users of the system.

To implement the traceability of an object, for example, fingerprints of one or more of its states can be declared and publicly published. These fingerprints are used to verify that the issuer does indeed have information, such as proving that data was known in the past.

2 - Creating Fingerprints with Hash Functions

Hash functions are cryptographic algorithms that take variable size data as input and produce a fixed-size output, called a hash value. This value is a fingerprint that possesses all the required qualities. The fundamental idea is that it must uniquely represent the input data.

Hash functions are designed to be particularly:

  • Deterministic: For the same input, the hash function must always produce the same hash result.
  • Resistant to attacks: It must be practically impossible to find the input from its hash value. In other words, the function must be one-way.
  • Stable and efficient: Produce a fixed-size output quickly.

Thus, we can create a unique proof for any data.

A hash function allows verifying that someone indeed knew data by recalculating the fingerprint of the information and comparing it with the original fingerprint.

The classic scenario is that an actor has information in their possession, so they create a fingerprint and make it public, so that if they need to prove they knew this information, they can always reveal the initial information later.

3 - The Blockchain: A Technology Natively Suited to Anchoring

Inscribing fingerprints (proofs of existence) in immutable storage is called anchoring. Anchoring represents the provision of existence proof made by a user at a given time.

The last decade has highlighted Blockchain technology that allows immutable, secure, and traceable storage. This technology finds a particularly powerful synergy with the principle of proof of existence. Indeed, the intrinsic properties of the blockchain provide assurance that:

  • the user's identity is not falsified
  • the proof is made public by the user at a given time
  • the user publishes a proof but does not disclose the entire content

Another advantage of using a blockchain is that it relies on an existing network and thus does not require setting up hardware to store data.

To set up an anchoring system on the blockchain, just create a program on the blockchain (called a smart contract) that allows publishing a fingerprint. Once a smart contract is published on the blockchain, all users can interact with this smart contract and thus anchor a fingerprint.

Thus, anchoring data on the blockchain allows building a database of certified and verifiable proofs.

4 - The Contribution of Anchoring through Blockchain Technology

Here are some of the essential benefits of using anchoring:

  • Proof of existence: By anchoring a hash of data on the blockchain, one can incontrovertibly prove that these data existed at a specific moment. This can be useful in areas such as intellectual property, contracts, authenticity certificates, etc. Once the hash is recorded on the blockchain, it becomes impossible to modify or falsify it without detection.
  • Data integrity: Anchoring a hash ensures the integrity of the stored data. Any change to the original data will alter the corresponding hash, which will be immediately detectable. This protects against data manipulation or corruption and provides an additional layer of trust for users.
  • Independent verification: Since the blockchain is a decentralized database, anyone can verify the hash anchoring and confirm the data's integrity. This reduces dependency on trusted third parties and allows for increased transparency.
  • Protection against censorship: Once the hashes are anchored on the blockchain, they become accessible to all and cannot be deleted or altered. This ensures some immunity against censorship or arbitrary deletion of information, thus preserving freedom of expression and access to information.

5 - Technical Considerations Related to Blockchain

Anchoring is a divisible process that can be performed in parallel on multiple blockchains (for redundancy needs or for parallelization needs). Scaling issues are common in popular public blockchains. By using two separate blockchains, companies can balance the workload. For example, some transactions can be carried out on one blockchain, while others can be executed on another, thus distributing the load and improving overall scalability.

By using two different blockchains, companies can also enhance the security of their operations. Re-creating fingerprints of fingerprints loses nothing, as the final fingerprints can only be found with the initial information. Thus, one can anchor on a blockchain reduced information that still possesses good properties.

In the event of a security breach or attack on one of the blockchains, data and operations on the other blockchain remain intact, thus ensuring business continuity. One can also have one blockchain more resistant than the other, thus increasing security.

Moreover, for scalability reasons, blockchains also come in a subsystem called layer-2 blockchains that offer better performance and are synchronized with the main blockchain. Indeed, layer-2 blockchains allow a greater number of anchored messages per second and a lower anchoring cost, but synchronization with the main blockchain requires a longer waiting time. The use of layer-2 blockchains is recommended when the use case accepts latency.

6 - Traceability Revolutionizes Operations Management in Companies

Transparency allows companies to comprehensively and immutably track the journey of their products throughout the supply chain.

Use cases are diverse: from the food industry, where the origin of products can be verified at each stage, to logistics, where the precise location of goods is recorded in real-time. This traceability is crucial to guarantee product quality, prevent counterfeiting, and ensure compliance with regulatory standards. Moreover, it reinforces consumer trust in brands, as they can verify the authenticity of the products they buy. In the food and pharmaceutical sectors, for example, traceability allows tracking the origin of products, quickly identifying defective or contaminated products, and removing these products from the market, thus ensuring consumer safety. In the event of an incident, such as food contamination, traceability allows companies to respond quickly and minimize losses by quickly identifying the source of the problem and removing defective products from the market.

In the case of digital, traceability is even more fundamental; it is present everywhere, to guarantee the authenticity of objects. Institutions, computer programs, the internet, blockchain, most services already benefit from it in one form or another. Moreover, in a context where privacy protection has become a major concern, transparent and secure traceability can help establish ethical standards and strengthen data privacy, which is crucial for compliance with regulations such as the GDPR (General Data Protection Regulation) in Europe. In short, in the digital world, traceability is an essential pillar to ensure security, trust, and privacy protection for users. By analyzing traceability data, companies can identify trends, customer preferences, and inefficiencies in their operations, which can lead to product innovations and continuous process improvements.

7 - Conclusion

Trust between today's actors is inescapable in many respects. To obtain it, one can use the tool of existence proofs in the form of fingerprints anchored on the blockchain. We have thus composed a process allowing data certification (without disclosing its content) and data verification (with a posteriori revelation). This anchoring can rely on blockchain technology, which brings inherent properties of security, traceability, transparency, and data immutability.

Written by
Frank Hillard
Blockchain engineer