A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Ensuring the reliability of data gathering from every connected device is an essential issue for promoting the advancement of the next paradigm shift, i.e., Industry 4.0. Blockchain technology is becoming recognized as an advanced tool. However, data collaboration using blockchain has not progressed sufficiently among companies in the industrial supply chain (SC) that handle sensitive data, such as those related to product quality, etc. There are two reasons why data utilization is not sufficiently advanced in the industrial SC. The first is that manufacturing information is top secret. Blockchain mechanisms, such as Bitcoin, which uses PKI, require plaintext to be shared between companies to verify the identity of the company that sent the data. Another is that the merits of data collaboration between companies have not been materialized. To solve these problems, this paper proposes a business-to-business collaboration system using homomorphic encryption and blockchain techniques. Using the proposed system, each company can exchange encrypted confidential information and utilize the data for its own business. In a trial, an equipment manufacturer was able to identify the quality change caused by a decrease in equipment performance as a cryptographic value from blockchain and to identify the change one month earlier without knowing the quality value.


Introduction
In order to promote Society 5.0, the Industrial Internet of Things, Industry 4.0, and so forth, it is important to connect and share data so that all IoT devices and all members can trust them. Blockchain (BC) technology is attracting attention as an advanced tool. Blockchain is a digital ledger for record-keeping over peer-to-peer (P2P) networks [1,2]. It is decentralized and dispersed in nature with tamper-resistant and tamper-evident features [3][4][5]. Each peer stores a copy of the blockchain and verifies the validity of the stored data, such that no peers can tamper with the data. For example, in the blockchain, all money in and out is stored in the block as historical data and connected in chronological order. The hash value of the previous block is included in the next block. Even if a peer participating in the network falsifies the data of a certain block, the hash value of the block will change, so it will not match the hash of the next block connected to it. Therefore, the fraud of the peer can be immediately revealed.
The concept of blockchain technology was derived from Bitcoin cryptocurrency, and then it spread to the financial field. This is still the main field in which blockchain technology is used [6,7]. Currently, in addition to the financial field, the blockchain technique is used in smart homes [8], smart cities [9,10], smart agriculture [11,12], smart power grids [13], smart transportation and automotives [14], smart healthcare [15,16], IoT networks [17,18], and security privacy [19]. In the smart-manufacturing field, much research momorphic encryption that computes an arbitrary number of additions and multiplications to encrypted data [39]. This scheme enables the programs for any desirable functionality, such as homomorphic property, to run on encrypted data and produce an encryption of the result. A partial homomorphic encryption exhibits either an additive or multiplicative homomorphism, but not both. In addition, the efficiency of some partial homomorphic encryption schemes is high enough for practical applications [40].
In a secure collaboration system that uses partial HE and blockchain techniques, each company in the SC can exchange confidential information using encrypted data and utilize it for their own business needs (Figure 1b). In this paper, as shown in Figure 1b, the encryption of plaintext using HE is denoted as ( ).

A B2B Collaboration Scenario on the Industrial SC
Let us consider a scenario in which manufactures a product of quality with equipment and delivers to ℬ. ℬ uses as a material to manufacture a product ℬ of quality ℬ with equipment ℬ . At this time, wants to optimize the production plan by identifying the level of quality ℬ that can be produced when the product is put into the equipment of ℬ. Although ℬ wants a stable supply of highquality materials from , it does not want to disclose its own manufacturing information because it is confidential. For this scenario, in this research, ℬ sends ( ℬ , ℬ , ℬ ) to using HE. Therefore, can calculate its relationship and compatibility with ( , , ) without knowing the specific product name ℬ , quality ℬ , and equipment ℬ , and it can formulate the optimum production plan for .
In the field of chemistry, products are manufactured by reacting materials. Therefore, the impact on product quality caused by the physical properties of materials and the compatibility of equipment is important. The utilization of the proposed scenario in real businesses can be expected.
In regard to the above scenario, this paper focuses on quality data. wants to catch the change of ( ℬ ) at time and + 1, and if there is a big change, will identify Regarding this issue, this paper proposes a secure B2B collaboration system in the SC that enables open data transfer and business coordination by combining blockchain technology and homomorphic encryption. In 1978, Ronald Rivest et al. suggested a proposal on the concept of homomorphic encryption [38]. Later, Craig Gentry proposed fully homomorphic encryption that computes an arbitrary number of additions and multiplications to encrypted data [39]. This scheme enables the programs for any desirable functionality, such as homomorphic property, to run on encrypted data and produce an encryption of the result. A partial homomorphic encryption exhibits either an additive or multiplicative homomorphism, but not both. In addition, the efficiency of some partial homomorphic encryption schemes is high enough for practical applications [40].
In a secure collaboration system that uses partial HE and blockchain techniques, each company in the SC can exchange confidential information using encrypted data and utilize it for their own business needs ( Figure 1b). In this paper, as shown in Figure 1b, the encryption of plaintext x using HE is denoted as Enc(x).

A B2B Collaboration Scenario on the Industrial SC
Let us consider a scenario in which A manufactures a product P A of quality Q A with equipment E A and delivers P A to B. B uses P A as a material to manufacture a product P B of quality Q B with equipment E B . At this time, A wants to optimize the production plan by identifying the level of quality Q B that can be produced when the product P A is put into the equipment of B. Although B wants a stable supply of high-quality materials from A, it does not want to disclose its own manufacturing information because it is confidential. For this scenario, in this research, B sends Enc(P B , Q B , E B ) to A using HE. Therefore, A can calculate its relationship and compatibility with (P A , Q A , E A ) without knowing the specific product name P B , quality Q B , and equipment E B , and it can formulate the optimum production plan for A.
In the field of chemistry, products are manufactured by reacting materials. Therefore, the impact on product quality caused by the physical properties of materials and the compatibility of equipment is important. The utilization of the proposed scenario in real businesses can be expected.
In regard to the above scenario, this paper focuses on quality data. A wants to catch the change of Enc(Q B ) at time t and t + 1, and if there is a big change, A will identify its own manufacturing factors, leading to optimum production. Therefore, in order to realize the proposed scenario, it is important to have a comparison protocol for the values of t and t + 1 so as to encrypt them. In the protocol, a function to put quality data into the blockchain and a function to get them from the blockchain are also important for implementing the proposed scenario.
The final system for the B2B collaboration is shown in Figure 2. In this final system, manufacturing companies can chain data without disclosing their quality data, while also guaranteeing their identities using blockchain. Even if the encrypted quality data were to be tampered with by an attacker, the hash value of the encrypted quality data would not match the value after decrypting the signature. Therefore, tampering could be detected immediately. In addition, traceability in the SC is possible by including the lot number of each company's products in the encryption. Under such a secure data linkage, A will be able to identify changes in the quality data of downstream companies in a timely manner and to utilize that information in its own manufacturing. its own manufacturing factors, leading to optimum production. Therefore, in order to realize the proposed scenario, it is important to have a comparison protocol for the values of and + 1 so as to encrypt them. In the protocol, a function to put quality data into the blockchain and a function to get them from the blockchain are also important for implementing the proposed scenario.
The final system for the B2B collaboration is shown in Figure 2. In this final system, manufacturing companies can chain data without disclosing their quality data, while also guaranteeing their identities using blockchain. Even if the encrypted quality data were to be tampered with by an attacker, the hash value of the encrypted quality data would not match the value after decrypting the signature. Therefore, tampering could be detected immediately. In addition, traceability in the SC is possible by including the lot number of each company's products in the encryption. Under such a secure data linkage, will be able to identify changes in the quality data of downstream companies in a timely manner and to utilize that information in its own manufacturing.

Conventional Comparison Protocol Using HE and Issues with B2B Collaboration
In 2016, Wu et al. proposed a comparison protocol based on Paillier cryptography, a kind of additive homomorphic encryption [41]. In the protocol, the client and server have the values and , respectively. Neither party learns anything else about the other party's input.
In the protocol, suppose the binary representations of and are , , … , (k bits) and , , … , (k bits), respectively. Using the following proposition, > or < is determined. (1). > if and only if there exists some index ∈ − 1 that satisfies Formula (2).

Proposition 1. < if and only if there exists some index ∈ − 1 that satisfies Formula
Here are the details. The client and server encrypt and with the public key, respectively. The client sends ( ) to the server. The server calculates Formula (1) or (2) by substituting ( ) and ( ) and using plaintext for XOR. The client receives the calculation result, decrypts it with the secret key, and checks for zero. Therefore, the client can determine that > or < without disclosing the value of to the server.

Conventional Comparison Protocol Using HE and Issues with B2B Collaboration
In 2016, Wu et al. proposed a comparison protocol based on Paillier cryptography, a kind of additive homomorphic encryption [41]. In the protocol, the client and server have the values x and y, respectively. Neither party learns anything else about the other party's input.
In the protocol, suppose the binary representations of x and y are x 0 , x 1 , . . . , x k−1 (k bits) and y 0 , y 1 , . . . , y k−1 (k bits), respectively. Using the following proposition, x > y or x < y is determined.
Here are the details. The client and server encrypt x i and y i with the public key, respectively. The client sends Enc(x i ) to the server. The server calculates Formula (1) or (2) by substituting Enc(x i ) and Enc(y i ) and using plaintext y i for XOR. The client receives the calculation result, decrypts it with the secret key, and checks for zero. Therefore, the client can determine that x > y or x < y without disclosing the value of x to the server.
In the proposed scenario for B2B collaboration, B has both x and y of the quality data, and A has Enc(x) and Enc(y). Therefore, A cannot calculate XOR using the above formula, and this conventional protocol is difficult to apply to B2B collaboration in the SC.
In addition, in order to realize the proposed scenario in an actual business, it is necessary to consider a system architecture, including business viewpoints and a comparison protocol, according to the architecture.

Proposal B2B Collaboration System on the SC
In [42], our previous work showed a secure comparison protocol for B2B collaboration in the SC at ICCE-TW2021. This paper shows the concrete system architecture required to implement the proposed scenario for the actual business. This paper also shows the usefulness of the proposal system by adding the evaluation results in specific business situations.

System Architecture of the B2B Collaboration
This paper shows the system architecture for implementing the proposed scenario in Figure 3. In a real business, it is necessary to have a servicer that provides value by exchanging data and guaranteeing the service level. In other words, the servicer is the company responsible for realizing the proposed scenario and the solution engineer who builds the data platform business. Therefore, the proposed system has a servicer S, as well as the manufacturers A and B. Each organization has at least one peer and certificate authority (CA) that manages the members of the organization, and the data is put into the blockchain by the orderer. Each peer has a state database that records the state of the data and a chaincode that holds the history of data transfers as a distributed ledger of the blockchain.
In the proposed scenario for B2B collaboration, ℬ has both and of the quality data, and has ( ) and ( ). Therefore, cannot calculate XOR using the above formula, and this conventional protocol is difficult to apply to B2B collaboration in the SC. In addition, in order to realize the proposed scenario in an actual business, it is necessary to consider a system architecture, including business viewpoints and a comparison protocol, according to the architecture.

Proposal B2B Collaboration System on the SC
In [42], our previous work showed a secure comparison protocol for B2B collaboration in the SC at ICCE-TW2021. This paper shows the concrete system architecture required to implement the proposed scenario for the actual business. This paper also shows the usefulness of the proposal system by adding the evaluation results in specific business situations.

System Architecture of the B2B Collaboration
This paper shows the system architecture for implementing the proposed scenario in Figure 3. In a real business, it is necessary to have a servicer that provides value by exchanging data and guaranteeing the service level. In other words, the servicer is the company responsible for realizing the proposed scenario and the solution engineer who builds the data platform business. Therefore, the proposed system has a servicer , as well as the manufacturers and ℬ. Each organization has at least one peer and certificate authority (CA) that manages the members of the organization, and the data is put into the blockchain by the orderer. Each peer has a state database that records the state of the data and a chaincode that holds the history of data transfers as a distributed ledger of the blockchain. As shown in Figure 3, this paper proposes a multi-channel system architecture that separates the chaincode for the quality data and the XOR data. ℬ has both and of the quality data and ℬ puts ( ) and ( ) into the quality chaincode of ℬ ( CC). can get ( ) and ( ) from CC. In the proposed scenario, the XOR data of ℬ are essential for the calculation of Formulas (1) and (2). These are important key data, from both a technical and a business perspective. Therefore, in the proposed system architecture, ℬ calculates ⨁ and puts ( ⨁ ) into the XOR chaincode (XOR CC). can get ( ⨁ ) from XOR CC and sell ( ⨁ ) to as a servicer. The reason As shown in Figure 3, this paper proposes a multi-channel system architecture that separates the chaincode for the quality data and the XOR data. B has both x and y of the quality data and B puts Enc(x) and Enc(y) into the quality chaincode of B (Q β CC). A can get Enc(x) and Enc(y) from Q β CC. In the proposed scenario, the XOR data of B are essential for the calculation of Formulas (1) and (2). These are important key data, from both a technical and a business perspective. Therefore, in the proposed system architecture, B calculates x ⊕ y and puts Enc(x ⊕ y) into the XOR chaincode (XOR CC). S can get Enc(x ⊕ y) from XOR CC and sell Enc(x ⊕ y) to A as a servicer. The reason that the servicer does not have the quality data is that the servicer and B may be in a competitive relationship. The servicer is only positioned to provide the key XOR data. Only A, which has a transaction with B in the SC, can grasp the change in quality.
There is another secondary reason for the architecture to have multiple channels with S. It is robust access control. If the product of B is manufactured from the materials of A and A , A might get the big quality change in the material of A from Q β CC as a business opportunity and make an offer to B to replace an order for the material of A. Even if A obtains the private key of A by some means, if S manages the XOR data and does not sell the data to A , A cannot calculate Formula (1) or (2) without the XOR data.

Implementation of the Comparison Protocol to Realize the B2B Collaboration System
This paper proposes an improved secure comparison protocol for implementation in the B2B collaboration system using a variant of Wu's protocol, which is based on Paillier cryptography. X and Y are the quality data (plaintexts) of B at time t and t + 1, respectively.
In this proposed protocol, Enc(x i ), Enc(y i ), and Enc(x i ⊕ y i ) are encrypted with Paillier cryptography [43]. In Paillier cryptography, message m ∈ Z n is encrypted by (3) with integers n = p·q, g = 1 + n mod n 2 , where p and q are prime numbers of about 3000 bits, r is a random number 0 < r < n ∈ Z * n 2 , and gcd(r, n) = 1. The public key is (n, g). The secret key is (p, q). C = g m ·r n mod n 2 Decryption is carried out via the following formula using Carmichael's theorem: r nλ mod n 2 = 1. Here, λ = lcm(p − 1, q − 1) and a function L(u) = (u − 1)/n.
Therefore, m = L C λ mod n 2 /L g λ mod n 2 mod n.
1. Cryptographic Protocol of B Table 1 shows the cryptographic protocol of B. First, B binary-expands the quality data X and Y. Additionally, B encrypts the x i bit of X, the y i bit of Y, and x i ⊕ y i using Formula (3). Then, it puts Enc(x i ), Enc(y i ), Enc(x i ⊕ y i ), and the public key into the blockchain, as shown in Figure 3 and Appendix A. Table 1. Encryption Protocol of B.
Step Processing 1 B binary-expands X and Y and encrypts x i and y i (i = 0~k-1 bits) with the public key.
2 B puts Enc(x i ), Enc(y i ), and the public key into the quality data chaincode Q β CC, as seen in Figure 3. 3 B calculates Enc(x i ⊕ y i ) with the public key. 4 B puts Enc(x i ⊕ y i ) and the public key into the XOR data chaincode XOR CC, as seen in Figure 3. Table 2 shows the calculation protocol of S. S gets and saves Enc(x i ⊕ y i ) and the public key from XOR CC, as seen in Figure 3. If there is a request from A, S uses the public key as a key to identify Enc(x i ⊕ y i ) and sends the Enc(x i ⊕ y i ) to A. S is a servicer that handles important XOR data in this B2B collaboration system. Table 2. Calculation Protocol of S.

Calculation Protocol of S
Step Processing 1 S gets and saves Enc(x i ⊕ y i ) and the public key from the XOR data chaincode XOR CC, as seen in Figure 3. 2 S receives an XOR data request and a public key from A. 3 S identifies the Enc(x i ⊕ y i ) that has the same public key sent by A in Step 2. 4 If there is an Enc(x i ⊕ y i ), S sends the Enc(x i ⊕ y i ) to A.  Table 3 shows the calculation protocol of A. A gets Enc(x i ), Enc(y i ), and the public key from Q β CC, as seen in Figure 3. Additionally, A gets Enc(x i ⊕ y i ) from S by sending a public key of t and t + 1, where A wants to identify the change. A calculates those quality data using Formulas (1) and (2) while keeping them encrypted. Table 3. Calculation Protocol of A.

Calculation Protocol of A
Step Processing 1 A gets Enc(x i ), Enc(y i ), and the public key from the quality data chaincode Q β CC as seen in Figure 3. 2 A sends the public key to S and receives Enc(x i ⊕ y i ) from S.

3
From the most significant bit, A calculates In the proposed protocol for Step 3, it is necessary to calculate Enc(−y i ) from Enc(y i ). This proposed protocol uses Formula (6) from Paillier cryptography to calculate Enc(−y i ). C n−1 = (g m .r n ) n−1 mod n 2 (6) Table 4 shows the decryption protocol of B. Using the secret key and Formula (5), B decrypts Enc(z i ) and searches for the bit, where z i = 0. Table 4. Decryption Protocol of B.

Decryption Protocol of B
Step Processing If there is z i = 0, B sends i to A. Table 5 shows the comparison protocol of A. Finally, A receives i or knows that z i = 0 did not occur. If A receives i while using Formula (1), then X < Y can be determined. If A receives i while using Formula (2), then X > Y can be determined. Here, i is the first different bit when comparing X and Y from the most significant bit. Therefore, using this proposed protocol, A can grasp X < Y or X > Y and the scale of the difference between X and Y without knowing the numbers that X and Y represent; that is, A can confirm the change in quality data in the time series. Table 5. Comparison Protocol of A.

Comparison Protocol of A
Step Processing 1 A receives i when z i = 0 or knows that z i = 0 did not occur.
2 If A receives i while using Formula (1), then X < Y can be determined. If A receives i while using Formula (2), then X > Y can be determined. 3 A checks the difference between the numbers at times t and t + 1 by calculating 2 i .

System Configuration
The proposed system was constructed as shown in Figure 4. A company was set up as one organization in a docker container on the AWS EC2. A blockchain network was built using Hyperledger Fabric, which utilizes the Amazon Managed Blockchain (AMB) service. Hyperledger Fabric was adopted to build a private blockchain for companies in the SC. In order to efficiently calculate multi-length arithmetic, the encryption, decryption, and calculation of the data were programmed by C++. APIs for both putting data into and getting data from the blockchain were developed by Golang. The proposed system was constructed as shown in Figure 4. A company was set up as one organization in a docker container on the AWS EC2. A blockchain network was built using Hyperledger Fabric, which utilizes the Amazon Managed Blockchain (AMB) service. Hyperledger Fabric was adopted to build a private blockchain for companies in the SC. In order to efficiently calculate multi-length arithmetic, the encryption, decryption, and calculation of the data were programmed by C++. APIs for both putting data into and getting data from the blockchain were developed by Golang.

Evaluation Result of the Concrete Data-Collaboration's Merits
Finally, this paper considers the usefulness of the proposed system and protocol. In the actual case in Figure 5, manufacturer provided dry dehumidifiers to the dry products of manufacturer ℬ. One day, a complaint was made about the decreased performance of the dehumidifiers from ℬ, and it turned out that the friction-reducing film, which should have been attached to the dehumidifying rotors, was not attached. It took four months from delivery for the performance reduction of be noticed. By applying the proposed protocol, ℬ was able share product moisture data, which are confidential manufacturing data, with in an encrypted manner. This paper evaluates whether was able to notice the quality change at an early stage in the actual business setting.

Evaluation Result of the Concrete Data-Collaboration's Merits
Finally, this paper considers the usefulness of the proposed system and protocol. In the actual case in Figure 5, manufacturer A provided dry dehumidifiers to the dry products of manufacturer B. One day, a complaint was made about the decreased performance of the dehumidifiers from B, and it turned out that the friction-reducing film, which should have been attached to the dehumidifying rotors, was not attached. It took four months from delivery for the performance reduction of be noticed. By applying the proposed protocol, B was able share product moisture data, which are confidential manufacturing data, with A in an encrypted manner. This paper evaluates whether A was able to notice the quality change at an early stage in the actual business setting.  Figure 6 shows the result of an experiment where the proposed protocol and system were applied. ℬ was able to provide confidential moisture data encrypted as messages 1 and 2. Using the proposed system, was able to detect the decreased performance in the third month by getting 10-times the encrypted moisture data from the quality chaincode and encrypted XOR data from the XOR chaincode so as to observe the changes in quality each month. In Paillier cryptography, message ∈ ℤ is required, so the quality data are multiplied by 10. As can be seen in Figure 6, does not know the specific numerical value of the quality data. This paper confirms the behavior and usefulness of the proposed system.  Figure 6 shows the result of an experiment where the proposed protocol and system were applied. B was able to provide confidential moisture data encrypted as messages 1 and 2. Using the proposed system, A was able to detect the decreased performance in the third month by getting 10-times the encrypted moisture data from the quality chaincode and encrypted XOR data from the XOR chaincode so as to observe the changes in quality each month. In Paillier cryptography, message m ∈ Z n is required, so the quality data are multiplied by 10. As can be seen in Figure 6, A does not know the specific numerical value of the quality data. This paper confirms the behavior and usefulness of the proposed system. were applied. ℬ was able to provide confidential moisture data encrypted as messages 1 and 2. Using the proposed system, was able to detect the decreased performance in the third month by getting 10-times the encrypted moisture data from the quality chaincode and encrypted XOR data from the XOR chaincode so as to observe the changes in quality each month. In Paillier cryptography, message ∈ ℤ is required, so the quality data are multiplied by 10. As can be seen in Figure 6, does not know the specific numerical value of the quality data. This paper confirms the behavior and usefulness of the proposed system.

Safety Evaluation of the Proposed System
This paper does not consider the case where ℬ maliciously puts incorrect quality data ( ) and ( ) to CC in Step 2 of Table 1. The incorrect quality data put by ℬ means to disrupt the SC for their own material procurement. Such cases are nonsensical from a business perspective and are not worth considering.
In Paillier cryptography, since does not know ( , ) and is masked by • in Formula (3), it is difficult to solve the discrete logarithmic problem in the exponential part of Formula (3). Thus, the message cannot be identified [43]. In the proposed comparison protocol of the B2B collaboration system, since ciphertexts are encrypted using random number in Formula (3), cannot identify or by comparing ( ), ( ), and ( ⨁ ), as can be seen in Figure 6.

Safety Evaluation of the Proposed System
This paper does not consider the case where B maliciously puts incorrect quality data Enc(x i ) and Enc(y i ) to Q β CC in Step 2 of Table 1. The incorrect quality data put by B means to disrupt the SC for their own material procurement. Such cases are nonsensical from a business perspective and are not worth considering.
In Paillier cryptography, since A does not know (p, q) and g m is masked by r p·q in Formula (3), it is difficult to solve the discrete logarithmic problem in the exponential part of Formula (3). Thus, the message m cannot be identified [43].
In the proposed comparison protocol of the B2B collaboration system, since ciphertexts are encrypted using random number r in Formula (3), A cannot identify x i or y i by comparing Enc(x i ), Enc(y i ), and Enc(x i ⊕ y i ), as can be seen in Figure 6.
In the B2B collaboration system, there is a risk that company C, participating in the quality channel, will impersonate A. Since C participates in the quality channel, C can get the public keys. If C intercepts A's Enc(z i ), falsifies the encrypted data with Paillier cryptography, and sends it to B, A will not be able to grasp the change in quality. However, since C is also a company in the SC related to B's products, when it is found that it is impersonating A, C will receive great punishment. That is, C will not be able to trade with any other company. Therefore, it is unlikely that spoofing by a company such as C will occur in the proposal system. Even if the encrypted data were to be leaked to a company that does not participate in a blockchain channel, it would not be tampered with unless the public key were leaked.

Conclusions
This paper proposed a secure comparison protocol for the sharing and grasping of changes to even highly sensitive data between companies by keeping the data encrypted. By implementing the protocol on a blockchain that connects companies in the industrial SC, this paper also proposed a B2B collaboration system. In a scenario with a business focusing on quality data, which is the most sensitive data in manufacturing, this paper showed that a company can grasp the change in the quality data of their business partner, while keeping the data encrypted, and subsequently feed that change back into its own manufacturing.
By using the proposed system, upstream companies will be able to grasp the quality changes of downstream companies. Combined with data from IoT sensors attached to their equipment, upstream companies will be able to proactively respond to the decreased performance of delivery equipment, which is directly linked to quality. In addition, smalland medium-sized manufacturers are said to lack sales resources, but the proposed system enables them to grasp the quality improvement needs of downstream companies in advance and reflect those needs in their own functional development. Upstream companies, many of which are large companies, do not disclose the quality value to other companies via encryption, and there is no concern that quality data will be tampered with by other companies by BC, so data can be provided with peace of mind. The social implementation of this research will create an ecosystem of collaboration among companies in the industrial SC, which will enable highly efficient manufacturing.
Note that the proposed protocol uses Paillier cryptography, which requires the use of a 6000-bit space for secure encryption and decryption. Investigating speed-up using elliptic cryptography or other methods is the goal for future research.  Acknowledgments: This work was partially supported by the Research Support Program toward Society 5.0 provided by Cypher at Okayama University, Japan. We are grateful to Ryota Miyamoto, who participated in helpful discussions and prototype development.

Conflicts of Interest:
The authors declare no conflict of interest. Figure A1a,b shows the data structure of Q β CC and XOR CC, respectively. Quality data and XOR data are put into the BC with a common lot number and public key n to identify when they were put and the production lot data to which they correspond. In Figure A1, "Pubkey_n" is the Paillier cryptography public key. Figure A1 shows an example where n is 32 bits. "T1Q_args" and "T2Q_args" are the quality data of times t and t + 1, respectively. "XOR_args" is the XOR data. The quality data and XOR data are bit-expanded and encrypted, respectively. The public key is updated every time, for a set of t and t + 1. identify when they were put and the production lot data to which they correspond. In Figure A1, "Pubkey_n" is the Paillier cryptography public key. Figure A1 shows an example where is 32 bits. "T1Q_args" and "T2Q_args" are the quality data of times and + 1, respectively. "XOR_args" is the XOR data. The quality data and XOR data are bitexpanded and encrypted, respectively. The public key is updated every time, for a set of and + 1.