Next Article in Journal
Intelligent Advanced Control System for Isotopic Separation: An Adaptive Strategy for Variable Fractional-Order Processes Using AI
Previous Article in Journal
Efficient CNN Accelerator Based on Low-End FPGA with Optimized Depthwise Separable Convolutions and Squeeze-and-Excite Modules
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Block-CITE: A Blockchain-Based Crowdsourcing Interactive Trust Evaluation

1
School of Artificial Intelligence, Guangzhou University, Guangzhou 510006, China
2
School of Computer Science, Guangdong Polytechnic Normal University, Guangzhou 510599, China
3
School of Beidou, Guangxi University of Information Engineering, Nanning 537499, China
*
Author to whom correspondence should be addressed.
AI 2025, 6(10), 245; https://doi.org/10.3390/ai6100245
Submission received: 28 July 2025 / Revised: 11 September 2025 / Accepted: 18 September 2025 / Published: 1 October 2025

Abstract

Industrial trademark examination enables users to apply for and manage their trademarks efficiently, promoting industrial and commercial economic development. However, there still exist many challenges, e.g., how to customize a blockchain-based crowdsourcing method for interactive trust evaluation, how to decentralize the functionalities of a centralized entity to nodes in a blockchain network instead of removing the entity directly, how to design a protocol for the method and prove its security, etc. In order to overcome these challenges, in this paper, we propose the Blockchain-based Crowdsourcing Interactive Trust Evaluation (Block-CITE for short) method to improve the efficiency and security of the current industrial trademark management schemes. Specifically, Block-CITE adopts a dual-blockchain structure and a crowdsourcing technique to record operations and store relevant data in a decentralized way. Furthermore, Block-CITE customizes a protocol for blockchain-based crowdsourced industrial trademark examination and algorithms of smart contracts to run the protocol automatically. In addition, Block-CITE analyzes the threat model and proves the security of the protocol. Security analysis shows that Block-CITE is able to defend against the malicious entities and attacks in the blockchain network. Experimental analysis shows that Block-CITE has a higher transaction throughput and lower network latency and storage overhead than the baseline methods.

1. Introduction

In traditional industrial trademark management systems, trademarks are examined by the centralized trademark management center (TMC), a process that will collect the privacy information of applicants. The TMC is a government agency that is responsible for managing industrial trademarks for enterprises. Even if the TMC is honest and trustworthy, it is vulnerable to being attacked by malicious hackers or other intruders, as it centralizes the trademark information together with applicants’ privacy information. Once the TMC is compromised or becomes malicious, all the information of trademarks and applicants’ privacy information may be leaked [1,2]. Thus, the security of industrial trademark management is of essential practical significance.
Recently, more and more organizations and companies select crowdsourcing as a method to solve various problems, especially in the fields of industry and commerce. Crowdsourcing, proposed by Jeff Howe in [3], is a distributed problem solving method calling for solutions publicly. Generally, there are three entities in the human intelligence-based crowdsourcing, which are requesters, workers, and a centralized crowdsourcing system [4]. Each entity has its own obligations and benefits, and all the entities can be briefly defined as follows: Requesters are nodes who receive services from the crowdsourcing system by submitting requests, retrieving solutions, etc. Workers are nodes who solve the tasks assigned by the crowdsourcing system and gain a reward only if the solution is satisfactory. A centralized crowdsourcing system is responsible for scheduling tasks between the requesters and workers. In the proposed scheme, the crowdsourcing technique can help interactive trust evaluation in the smart contract-based blockchain network, as the crowdsourcing system can call for the solutions of trademark examinations which are auto-performed by workers. As such, the security of the blockchain-based interactive trust evaluation can be further enhanced by the crowdsourcing technique.
However, the results returned by workers in the crowdsourcing system may not meet the requirements of requesters, and there also exist some malicious examiners in the blockchain network. Meanwhile, even though the centralized entity is assumed to be trustworthy, it is still vulnerable to being attacked. Fortunately, emerging blockchain technique are able to provide a more secure and efficient decentralized environment for establishing trust among users [5]. Thus, they have attracted keen interest from many researchers in various fields recently.
Most blockchain-based existing works adopt the single-blockchain structure [6,7,8,9] and address the problem of security vulnerability and unbalanced data access, while some frontier researches have began to explore solutions with a double-blockchain structure. Specifically, the access frequency of different types of data varies, in which separately accessing hot and warm data in two blockchain can reduce overhead and improve performance [10]. Notably, the double-chain structure has unique advantages for solving the problem mentioned above. On the one hand, the confidential information is separated from the transparent information, which thus enhances the security of the proposed scheme. On the other hand, frequently accessed data are separated from the infrequently accessed ones, which thus improves the performance of the proposed scheme. Meanwhile, a double-blockchain structure has been applied in many existing works to improve the performance of systems [11,12,13,14,15].
There are still scenario-specific challenges that hinder the direct application of blockchain to secure and efficient crowdsourcing services for trademark examination, forming the following well-defined research gaps: Firstly, most existing crowdsourcing systems for general fields assume that centralized entities are fully trustworthy, but this assumption fails in trademark examination. The reason is that centralized platforms not only face security risks from unnotarized storage of sensitive trademark data but also cannot be completely removed due to regulatory requirements for audit trails. Thus, a critical research gap lies in decentralizing core functions of centralized entities to blockchain nodes while retaining necessary audit capabilities (i.e., an unaddressed need unique to trademark examination). Secondly, designing a crowdsourcing interactive trust evaluation protocol tailored to the dual-blockchain structure for trademark examination constitutes a distinct gap. That is, current trust protocols target either single-blockchain architectures or general crowdsourcing, lacking adaptation to the dual-chain division of “examination tasks” and “credit records” specific to our trademark system. Additionally, formal security proofs for such scenario-specific protocols (e.g., proving resistance to trademark data tampering during trust evaluation) remain an unmet research need, unlike generic blockchain security proofs. Finally, the performance bottleneck of decentralized storage in trademark examination presents a targeted gap. Specifically, unlike general data, trademark data include high-frequency “pending examination materials” and low-frequency “historical registration records,” and existing data separation techniques fail to account for the legal relevance between these two data types (e.g., ensuring that historical records are quickly retrievable for pending examinations). Thus, there is with urgent need for an appropriate separation technique to mitigate performance degradation in decentralized systems.
In order to deal with the challenges mentioned above, this paper proposes the Blockchain-based Crowdsourcing Interactive Trust Evaluation (Block-CITE) scheme. Block-CITE is able to enhance data security, improve system performance, and increase flexibility for crowdsourcing services. Specifically, in Block-CITE, we constructed two blockchains, namely, TaskChain and RepuChain. The reason for designing a dual-blockchain structure in this paper is mainly derived from the observation that the frequently accessed TaskChain should be separated from the infrequently accessed RepuChain. As such, hot and cold data are separated, which improves the performance of the proposed system. TaskChain is responsible for storing the information of trademark examination tasks, while RepuChain is responsible for storing the reputation of the workers. As such, all nodes in the blockchain network witness the requesters’ ownership of their trademark material, ensuring the security of Block-CITE. Moreover, the dual-chain architecture of TaskChain and RepuChain not only separates hot and cold data to optimize performance but also leverages the decentralized nature of blockchain. Specifically, the allocation and execution process of trademark examination tasks in TaskChain is traceable and immutable, avoiding the risks of task tampering or shirking in traditional centralized systems. Meanwhile, RepuChain automatically records the historical behavior data of examiners through smart contracts, forming a decentralized trust evaluation system that provides a reliable basis for subsequent task allocation. Finally, these features are unique blockchain advantages that are difficult to achieve with traditional database designs.
The brief processes of the trademark examination in the proposed scheme, Block-CITE, are as follows: A requester R i first makes a deposit and sends a trademark application request to the TMC, together with the encrypted trademark material. Malicious nodes are penalized by forfeiting their deposits, and their behaviors are also recorded by the blockchain. Meanwhile, the hash of the material is appended to TaskChain by R i , in order to prevent denial by the TMC. Upon receiving the request, the TMC selects a qualified worker W j according to the reputation in RepuChain and generates the corresponding task information. Then, the task information is publicized by being appended to TaskChain. The TMC assigns the task to W j by sending the materials to W j . After receiving the task, W j has to finish the trademark examination for R i before the deadline. Upon finishing the task, W j packs the result into a solution and send it to the TMC. Meanwhile, the hash of the solution is also appended to TaskChain by W j , in order to prevent denial by the TMC. According to the situation of task completion, the TMC calculates the reward for W j and compensation for R i and appends them to TaskChain. Afterwards, the TMC sends the result in the solution to R i . Finally, the TMC and R i score the reputation for W j , and the reputation is appended to RepuChain. As such, participants can perceive the malicious behaviors of all entities in Block-CITE, including the TMC.
The main contributions of this paper are summarized as follows:
  • We propose a Blockchain-based Crowdsourcing Interactive Trust Evaluation (Block-CITE) scheme, which operates in a decentralized way. Unlike previous works, Block-CITE is able to guarantee security by allowing users to take part in the blockchain-based crowdsourcing service without revealing their true identities and storing the hash value of trademark materials and examination results to the blockchain. As such, the ownership of anonymous users for their trademark materials can be guaranteed.
  • A concrete scheme is presented in this work, and smart contract are utilized for performing the whole process of the proposed scheme, Block-CITE. As such, the functions of crowdsourcing for trademark examination can be realized without trusting any centralized entity.
  • A detailed security analysis of Block-CITE is undertaken in this paper. Specifically, we conduct a simulation on the well-known 51% attack in the blockchain network, and we also provide a theoretical proof of blockchain security. Both the simulation result and the theoretical proof of security show that Block-CITE is secure enough for industrial trademark examination.
The remainder of this paper is organized as follows: Section 2 discusses related works on crowdsourcing and blockchain techniques. Section 3 introduces the preliminaries of bilinear pairing, blockchain, and smart contracts. Section 4 presents the proposed blockchain-based crowdsourcing trademark examination scheme and its security properties. Section 5 provides the security analysis. Section 6 presents simulations and results. Section 7 concludes this paper.

2. Related Works

Crowdsourcing is able to solve problems with some intelligence based on less overhead, and it is widely used in tasks that are different for computers or individuals to finish, such as audio translation, image tagging, etc. In this section, we have reviewed some state-of-the-art works in three primary research domains: centralized crowdsourcing systems, distributed crowdsourcing systems, and blockchain-based crowdsourcing systems.

2.1. Centralized Crowdsourcing Solutions

There exist several crowdsourcing systems that have been developed in a centralized way, such as UpWork, WAZE, and Freelancer. Zhang et al. [16] proposed a reputation-based incentive mechanism to address the false-reporting and free-riding attacks in crowdsourcing. Ni et al. [17] examined the architecture and applications of centralized fog-based vehicular crowdsensing in terms of security, privacy, and fairness. Zhang et al. [18] proposed two centralized mechanisms to tackle free riding and false reporting in crowdsourcing. To ensure that large mobile crowdsensing can more effectively handle sensing tasks for achieving certain coverage under certain constraints, Lu et al. proposed a centralized data-driven crowd worker selection method in mobile crowdsourcing for the industrial IoT [19]. Ma et al. proposed a dynamic sub-cluster privacy-preserving aggregation approach operating in a centralized manner for crowdsourcing industrial virtual areas balancing data benefits and privacy security [20]. However, centralized crowdsourcing solutions may suffer from security issues, e.g., sybil attack and privacy leakage.

2.2. Distributed Crowdsourcing Solutions

Zhang et al. proposed a distributed crowdsourcing system in the delay-tolerant network, aiming at completing a computation task in a collaborative way and achieving the minimal makespan [21]. Yang et al. concentrated on load balancing in a distributed model and proposed a task allocation scheme using social relationships in a crowdsourcing system [22]. Cheung et al. proposed a distributed and asynchronous task selection method in mobile crowdsourcing [23]. Wang et al. proposed a distributed truthful incentive mechanism in mobile crowdsourcing in which auctions can be performed on mobile devices locally [24]. To protect location privacy, Li et al. presented an online crowdsourcing task assignment method in a fully distributed way [25]. Xu et al. proposed a distributed spatial crowdsourcing method to guarantee the scalability and the quality of services (low time latency, etc.) for spatial crowdsourcing systems [26]. However, most of the existing distributed solutions do not actually make the functions of a centralized entity distributed, which is inconsistent with the requirements in our idea.

2.3. Blockchain-Based Crowdsourcing Solutions

Blockchain-based crowdsourcing solutions have been widely utilized to solve insider threats and free-riding or false-reporting issues for industrial applications. Hasan et al. designed a concrete, public-sector DID/KYC framing that one can reference when justifying permissioning choices and compliance in government workflows [27]. AlSobeh et al. use smart contracts and on-chain logic and support the claim that correctness and safety of blockchain workflows benefit from formal modeling/model checking [28]. AlSobeh et al. support runtime observation/monitoring and systematic validation of dynamic protocol paths [29]. Harasees et al. emphasize off-chain encrypted payloads, edge/fog custody, and end-to-end privacy [30]. Regarding security techniques of blockchain applied in crowdsourcing, Li et al. proposed a blockchain-based decentralized framework for crowdsourcing to improve security and availability for users [31]. In terms of trust techniques of blockchain applied in crowdsourcing, Zou et al. proposed a consensus protocol named Proof-of-Trust to deal with inappropriate behaviors derived from the crowdsourcing service networks [32]. Regarding privacy techniques of blockchain applied in crowdsourcing, Yang et al. proposed a blockchain-based privacy protection crowdsourcing system in order to protect the location privacy of staff and increase the success rate of assigned tasks [33]. To ensure crowdsourcing task privacy with transparent and distributed storage, Tong et al. proposed a parallel crowdsourcing method named CHChain in a hybrid blockchain structure [34]. Fu et al. proposed a blockchain-based crowdsourcing scheme with reputation and incentives to resist the security risk derived from the central server and malicious behavior among participants [35]. To avoid the privacy leakage risk derived from untrusted third parties effectively, Wang et al. developed a T-LGEB mechanism based on the blockchain architecture for mobile crowdsourcing systems [36]. Liao et al. proposed a blockchain-based crowdsourcing method to protect the confidentiality of crowdsourcing tasks in transmission and reduce energy consumption of mobile devices for optimizing task assignment [7]. Different from the solutions mentioned above, Block-CITE adopts a double-blockchain structure and smart contracts to enhance security and improve the performance of crowdsourcing interactive trust evaluation services.

3. Preliminaries

3.1. Bilinear Pairing

Let G be a Gap Diffie–Hellman (GDH) group, and G T be the other multiplicative cyclic group of prime order p. The bilinear pairing can be described as a map e : G × G G T , and it has the following properties:
  • Equation e ( x u , y v ) = e ( x , y ) u v holds, where x , y G and u , v Z p .
  • In polynomial time, there exists an efficient algorithm to compute the bilinearty equation.
  • e ( x , y ) 1 , in the case where g is a generator of G .

3.2. Blockchain

Blockchain is a well-known backbone technique of Bitcoin which was proposed by Nakamoto in [37]. Recently, it has widely attracted the interest of researchers and engineers in both academia and industry. It now plays an important role in many research fields, because of its characteristics of immutability, transparency, decentralization, etc. In the P2P-based blockchain network, nodes with sufficient computational power can compete for the right to generate a new block as a miner by solving the mathematical puzzle in the consensus mechanism. And the miner can pack the transactions dealt in a consensus epoch into a new block and append the new block to the blockchain.
Generally, there are three kinds of blockchains, which are public blockchains, consortium blockchains, and private blockchains. A public blockchain is maintained by all nodes in the P2P network, in which each node is able to check and verify transactions and take part in the consensus process. Both Bitcoin and Ethereum are classical applications of public blockchains. A consortium blockchain is maintained by some parties, and the nodes with authority can be selected in advance. And the partnerships are usually business to business; for example, multiple banks can build a consortium blockchain to improve security for cross-bank transactions. A private blockchain is owned and controlled by a single entity, which means that not every node can take part in the private blockchain. No matter the type of blockchain, all of them have advantages. Researchers and developers can choose the appropriate type of blockchain based on their requirements.
The blockchain type in the proposed scheme, Block-CITE, is a public blockchain with the Proof-of-Work consensus mechanism, and the simple procedure is as follows: Each node in the blockchain network can issue a transaction and broadcast it to the network. Nodes with sufficient computation power can compete for the right to generate a new block as the miners. The miners collect the transactions in a consensus epoch and then pack the transactions into a block. After a miner generates a new block successfully, the miner broadcasts the new block in the blockchain network. Once they receive the new block, all nodes in the network check the block’s validity and append the new block to the blockchain. Afterwards, the miner can obtain a reward for generating the new block.

3.3. Smart Contract

Smart contracts, proposed by Nick Szabo, have become a hot spot in research because of blockchain 2.0 [38]. Blockchain-based smart contracts are promising in the field of industry and commerce, and they are able to promote many industrial and commercial sectors in various ways. There are two famous platforms supporting smart contracts based on blockchain, namely, Ethereum [39] and Hyperledger [40]. A smart contract stored on the blockchain is a tiny auto-executable program that formulates rights and obligations for participants. Meanwhile, blockchain techniques can provide a secure, decentralized environment for implementing smart contracts. Thus, without a trustworthy third party, a smart contract is able to execute a trusted contract over the public P2P network.

4. Block-CITE: A Blockchain-Based Crowdsourcing Interactive Trust Evaluation Method

4.1. Overview

This paper aims to design a decentralized crowdsourcing system with security, reliability, and efficiency for interactive trust evaluation. As can be seen in Figure 1, taking industrial trademark examination as an example, there are three entities in the proposed scheme, which are the trademark management center, the requester, and the worker. The trademark management center (TMC) is a government agency that is in charge of managing industrial and commercial trademarks for enterprises. Requester nodes, denoted by R = { R 1 , R 2 , , R i , } , are nodes with demands for trademark examination to obtain trademark rights. Worker nodes, denoted by W = { W 1 , W 2 , , W j , } , are nodes with certain skills in trademark examination that get paid. Miner nodes can be any requester nodes or worker nodes with sufficient computation power to solve the math puzzles of the consensus mechanism.
Before taking part in the proposed system, each node has to make a deposit, because it can efficiently resist sybil attacks, DDoS attacks, false-reporting attacks, and free-riding attacks. Additionally, storing the hashes of task information and reputation information on TaskChain and RepuChain can also resist malicious behaviors, because nobody can deny any behavior that has been recorded on the blockchain. In order to obtain satisfactory crowdsourcing results, the TMC only selects workers whose reputation value is above a dynamically adjusted threshold value. The threshold value is similar to the difficulty number in the Proof-of-Work (PoW) consensus mechanism, which is a system parameter.
As shown in Figure 2, there are two blockchains in Block-CITE, namely, TaskChain and RepuChain. TaskChain stores information about trademark examination tasks, including the anonymous identity of requesters and workers, information about tasks, etc. RepuChain stores the reputation of workers, which is scored by the requesters and the TMC. As blockchain is a decentralized ledger, it is not wise to store too many data on it. We store the hash value of trademark materials on blockchain instead of the materials themselves.

4.2. The Protocol of Block-CITE

The protocol of the proposed scheme can be defined as ∏ = ( I n i t i a l i z a t i o n , R e q u e s t i n g , R e c e i v i n g , S u b m i t t i n g , M i n i n g , R e w a r d ), and the notations for the protocol are shown in Table 1.

4.2.1. I n i t i a l i z a t i o n ( k , g , α , K e y G e n ( · ) , H ( · ) ) { S y s P a r a i }

Based on elliptic curve cryptography [41,42], each user generates a random key pair ( s p k i , s s k i ) K e y G e n ( 1 k ) for a digital signature by a bilinear pairing, where k is a random integer. Let g be the generator of the group G . Each user selects a random α in Z p and calculates v g α . As such, the private key of the user is s k i = ( α , s s k i ) , and the public key of the user is p k i = ( v , s p k i ) . Then, each user generates a d d r i H ( p k i | | φ ) as the exclusive address for anonymous communication in the blockchain network, where 1 i n and H ( ) is a secure hash function. Moreover, φ is randomly chosen by the user as a private number and φ Z p . Specifically, φ is derived from a BIP-39 mnemonic and secured within a hardware security module (HSM) or a trusted execution environment (TEE) on the user’s device, aligning with standard HD wallet practices. This ensures φ never exposes the full private key hierarchy. Thus, the system parameters for the i-th node can be defined as S y s P a r a i = { p k i , s k i , s p k i , s s k i , a d d r i , H ( ) } .

4.2.2. R e q u e s t i n g ( S y s P a r a i , M , p k TMC ) { M E , Φ i , h i }

The i-th requester R i ( 1 i n ) encrypts the trademark materials M to M E by using the public key p k TMC of the TMC and uploads the encrypted materials to the TMC. Specifically, the requester divides M into data blocks m j ( 0 < j b , where b is the number of data blocks) with fixed size and encrypts the blocks by using p k TMC . Note that M = { m 1 , m 2 , , m j , , m b } and M E = { e 1 , e 2 , , e j , , e b } . Then, R i signs the encrypted data blocks with its s s k i and generates the digital signature τ j , where 0 < j b . Note that Φ i is the set of τ j , i.e., Φ i = { τ 1 , τ 2 , , τ j , , τ b } . Meanwhile, R i calculates the hash value of the encrypted materials M E by h i H ( M E ) and uploads h i to the blockchain. Notably, regarding off-chain storage, we will clarify that mutual evidence ME is stored on a decentralized storage network (IPFS) and the access path is a content identifier (CID). As such, all nodes in the blockchain network can detect whether the encrypted materials stored on the TMC are complete or correct.

4.2.3. R e c e i v i n g ( M E , s k TMC , s p k i , Φ i ) { I n f o , T a s k s }

Once the TMC receives M E , it verifies Φ i by s p k i of R i and decrypts M E to M by its private key s k TMC . The TMC generates the information set I n f o = { t a s k F e e , d e p o s i t , W I D , R I D } for the requester, where W I D and R I D are the IDs of W k and R i . Then, the TMC calculates the trademark examination fee t a s k F e e and selects a worker W k according to the worker’s reputation score. W k submits a deposit d e p o s i t = t a s k F e e 2 to the TMC. Finally, the TMC generates the task set T a s k s = { t 1 , t 2 , , t t , } and appends T a s k s to the blockchain, in which t t = { t a s k I D , t a s k F e e , t a s k D L , t a s k H a s h , t a s k R V , t a s k T i m e , t a s k S t a t u s } . Note that t a s k D L is the deadline of t t , t a s k R V is the reputation value of W j , and t a s k T i m e is the submission time of t t .

4.2.4. S u b m i t t i n g ( M , T a s k s ) { S o l u t i o n s }

The TMC encrypts the trademark materials M by the public key of W k . Then, W k receives and decrypts the materials after paying d e p o s i t to the TMC. After finishing the trademark examination, the worker encrypts the solution by the TMC’s public key and returns the solution to the TMC. Note that S o l u t i o n s = { s 1 , s 2 , , s t , } , where s t = { s o l u t i o n I D , t a s k I D , r e s u l t , W I D , s o l u t i o n T , s o l u t i o n S T } . s o l u t i o n T is the time in which W k returns s t , and s o l u t i o n S T is the status of s t (i.e., whether the solution is received, verified, or passed). Finally, W k appends solutions s t together with hash values h t H ( s t ) to the blockchain.

4.2.5. R e w a r d ( T a s k s , S o l u t i o n s ) { R e w a r d s , C o m p e n s }

The workers pay the deposits every time they receive a task. If the worker does not finish the task within the specified time, the TMC does not pay the task fee or refund the deposit. When the task deadline is reached, the reward is t a s k on × t a s k F e e , and the deposit that needs to be returned is t a s k on × t a s k F e e 2 , where t a s k on is the number of finished tasks and t a s k over is the number of unfinished tasks. Additionally, the compensation C o m p e n s to the requester should be t a s k over × t a s k F e e 2 . Finally, the TMC appends h t r H ( R e w a r d s ) and h t c H ( C o m p e n s ) for task t t to the blockchain.

4.2.6. M i n i n g ( n o n c e , b c h e a d ) { R e p u s , b l o c k }

The TMC allows requesters to score the examination results as R e p u r , and the TMC also scores the results as R e p u TMC . Then, the scores are publicized by being uploaded to the blockchain as workers’ reputation R e p u s = { R e p u r , R e p u TMC } . Finally, the reputation R e p u s of workers can be updated on the blockchain by the miner. Specifically, the miner in a consensus epoch gathers the information of the crowdsourcing task, the reputation of workers, the hashes of trademark material, etc., during the epoch. n o n c e is a random number in the blockhead b c h e a d , and the miner enumerates n o n c e to obtain a hash value h by h H ( n o n c e | | b c h e a d ) . Once h is satisfied with the difficulty requirement of the consensus mechanism (e.g., the number of leading 0s of the Proof-of-Work consensus mechanism), the miner can issue a new b l o c k containing the gathered information.

4.3. Smart Contracts for Block-CITE

In order to formalize the Block-CITE protocol, we provide the algorithm of smart contracts for Block-CITE so that readers can understand the details of Block-CITE clearly and easily. There are 5 algorithms, which are Initialization, Requesting, Receiving, Submitting, and Reward Paying. These smart contracts are issued to the blockchain and automatically run by the nodes. All the contracts and the results are also recorded on the blockchain.

4.3.1. Initialization Contract

As shown in Algorithm 1, this contract initializes the system parameters for each node, in which requesters and workers can take part in the system anonymously without being assigned any identity. Specifically, the requesters and workers can generate their key pairs for encryption and digital signing locally. They can also communicate with each other through the P2P network wallet address in the blockchain. The address of each node is produced by generating the hash with the public key and a random integer. This is more secure than traditional industrial trademark examination schemes, because the address does not include any information about the nodes.
Algorithm 1 Initialization.
Input: random integer k, group generator g, random integer α , key generation function K e y G e n ( ) , secure hash function H ( )
Output:  S y s P a r a i
Begin
1:
There are n nodes in the blockchain network;
2:
if the i-th node is unregistered then
3:
     ( s p k i , s s k i ) ← K e y G e n ( 1 k ) ;
4:
      v g α ;
5:
      s k i = ( α , s s k i );
6:
      p k i = (v, s p k i );
7:
      a d d r i H ( p k i | | φ ) and φ Z p ;
8:
      S y s P a r a i = { p k i , s k i , s p k i , s s k i , a d d r i , H ( ) } ;
9:
else
10:
    go final;
11:
end if
12:
release p k i , s p k i , a d d r i to the blockchain network;
13:
final;
14:
return  S y s P a r a i
End

4.3.2. Requesting Contract

As shown in Algorithm 2, this contract allows requesters to launch requests to the TMC for trademark examinations. Specifically, the requesters encrypt the trademark materials by p k TMC and sign the encrypted materials with their private key for a digital signature. Then, the requesters hash the encrypted materials and append the hash values to TaskChain.
Algorithm 2 Requesting.
Input: System parameter S y s P a r a i , plaintext of trademark material M, public key of TMC p k TMC
Output: Ciphertext of trademark material M E , the set of digital signature Φ i , hash value h
Begin
1:
There are b data blocks of M;
2:
M = { m 1 , m 2 , m j , , m b } ;
3:
Requester R i lauch a request to TMC;
4:
M E M by p k TMC ;
5:
s s k i S y s P a r a i ;
6:
for  0 < j < b   do
7:
       e j m j by p k TMC ;
8:
       τ j e j by s s k i ;
9:
       R i append τ j to Φ i ;
10:
end for
11:
M E = { e 1 , e 2 , e j , , e b } ;
12:
H ( ) S y s P a r a i
13:
h i H ( M E ) ;
14:
R i appends h i and Φ i to blockchain;
15:
R i uploads M E to the TMC;
16:
final;
17:
return  M E , Φ i , h i
End

4.3.3. Receiving Contract

As shown in Algorithm 3, this contract allows the TMC to create trademark examination tasks for requests from the requesters and assign the tasks to the qualified workers appropriately. Specifically, the TMC can verify the digital signature of the encrypted materials by the public signature key of requesters and decrypt the material by its own private key s k TMC . Then, the TMC generates the task set according to the information of the requesters and workers and append the task information to TaskChain. Finally, according to the task information, the TMC sends the trademark materials encrypted by the public key of the selected worker.
Algorithm 3 Receiving.
Input: Ciphertext of the trademark material M E , private key of the TMC s k TMC , public signature key of the requester s p k R , the set of digital signature Φ
Output: Transactions information I n f o , the set of tasks T a s k s
Begin
1:
TMC verifies Φ i by s p k i of R i ;
2:
M M E by s k TMC ;
3:
TMC calculates the trademark examination fee t a s k F e e ;
4:
TMC selects a worker W j according to W j ’s reputation;
5:
I n f o = { t a s k F e e , d e p o s i t e , W I D , R I D } ;
6:
d e p o s i t e =   t a s k F e e / 2 ;
7:
W j submits d e p o s i t e to TMC;
8:
TMC generate t t = { t a s k I D , t a s k F e e , t a s k D L , t a s k H a s h , t a s k R V , t a s k T i m e , t a s k S t a t u s } ;
9:
T a s k s = { t 1 , t 2 , , t t , } ;
10:
final;
11:
return  I n f o , T a s k s
End

4.3.4. Submitting Contract

As shown in Algorithm 4, this contract allows workers to submit their examination results to the TMC before the deadline of the tasks. Specifically, the workers receive the encryted materials and decrypt the material by their own private key. Once the workers finish the trademark examination, they generate solutions including the results for the tasks. Then, the workers encrypt the solutions by p k TMC and return the solutions to the TMC. Finally, the workers append the solutions to the blockchain together with the hash values of the solutions.
Algorithm 4 Submitting.
Input: Plaintext of the trademark material M, the set of task T a s k s
Output: the set of solution S o l u t i o n s
Begin
1:
TMC encrypts M to M E by the public key of W k ;
2:
W k pays d e p o s i t e to TMC;
3:
W k receives and decrpyts M E to get M;
4:
W k finishes the trademark examination;
5:
W k generates s t = { s o l u t i o n I D , t a s k I D , r e s u l t , W I D , s o l u t i o n T , s o l u t i o n S T } ;
6:
S o l u t i o n s = { s 1 , s 2 , , s t , } ;
7:
final;
8:
return  S o l u t i o n s
End

4.3.5. Reward Paying Contract

As shown in Algorithm 5, this contract allows the TMC to pay the rewards or refund the deposits to workers or requesters. Specifically, the TMC computes the rewards for workers and compensation for requesters according to the situation of task completion. Then, the TMC calculates the hash values h t r of rewards and h t c of compensations. Finally, the TMC appends h t r and h t c to TaskChain.
Algorithm 5 Reward Paying.
Input: The set of task T a s k s , the set of solution S o l u t i o n s
Output: Rewards to worker R e w a r d s , compensation to requester C o n p e n s
Begin
1:
for  t t in T a s k s  do
2:
      if  t t is finished in time then
3:
            t a s k on + 1;
4:
      else
5:
            t a s k over + 1;
6:
      end if
7:
end for
8:
R e w a r d t a s k on × t a s k F e e ;
9:
d e p o s i t e t a s k on × t a s k F e e 2 ;
10:
C o n p e n s t a s k over × t a s k F e e 2 ;
11:
final;
12:
return  R e w a r d s , C o n p e n s
End

5. Security Analysis

In this section, we provide the security analysis of the proposed scheme.

5.1. Setup

Similar to existing works on blockchain systems, this study divides time into consecutive epochs in the proposed scheme [31,43]. The generation of a new block means the start of the new epoch and the end of the previous epoch. The transactions among nodes occur continuously and independently at a constant average rate. Both TaskChain and RepuChain are public chains and adopt the PoW mechanism as the consensus mechanism. In this section, we provide a security analysis of the PoW-based blockchain network in the proposed scheme. The security analysis is applicable to both TaskChain and RepuChain.
All nodes in the blockchain network only recognize the longest chain as the valid chain, and the probability of nodes generating a new block is proportional to their computation power (e.g., hashing power in a PoW-based blockchain network). As such, the attacker who owns more than half of the computation power can launch a 51% attack (widely accepted in [1]) to forge the longest chain.
Considering the extreme situation in the proposed scheme, we assume that the attacker owns more than half of the computation power in the blockchain network. Let z be the number of blocks by which the attacker lags behind the longest chain. We provide a simulation of the probability that the attacker can catch up to the longest chain with different computation power rates. As shown in Figure 3, with the decrease in the computation rate of the attacker (i.e., from 95% to 51%), the probability of attackers catching up to the longest chain drops sharply. For example, when z = 6 and the computation rate of the attacker is 51%, the probability is 0.0004%. However, z is actually much larger than 6, and the computation rate of the attacker is much less than 51% in reality. Thus, the PoW consensus mechanism is secure enough for the proposed scheme.

5.2. Threat Model

All nodes in the proposed scheme are assumed to be honest but curious, and they attempt to obtain extra information of other nodes whenever there is a chance. Thus, requesters, workers, and the TMC are considered to be semi-trusted. Malicious requesters and workers have different goals, aiming at maximizing their own profits. The proposed scheme considers the extreme situation whereby all nodes (including requesters and workers) in the proposed scheme can participate in mining. The malicious entities and their malicious behaviors in Block-CITE are introduced as follows.

5.2.1. Malicious Requesters

Malicious requesters can launch a false-reporting attack [18] by making a false report on purpose, to obtain the results without losing their deposits. However, the hashes of the task and reputation are stored on the blockchain with a timestamp. Thus, the proposed scheme, Block-CITE with blockchain, is able to resist malicious requesters efficiently.

5.2.2. Malicious Workers

Malicious workers can launch a free-riding attack [18] by obtaining rewards without any effort. Specifically, malicious workers may return a random result directly without doing anything. However, the TMC and requesters check and score the results from the worker, and the hashes of the results are also stored on the blockchain. Free-riding behaviors lead to the loss of deposits for a malicious worker. Thus, the proposed scheme, Block-CITE with blockchain, is able to resist malicious workers efficiently.

5.2.3. Malicious Miners

Miners in a blockchain network can be any nodes with sufficient computation power, and miners try to obtain more benefits because they have the opportunity to generate a new block. Specifically, malicious miners can fork a longer chain by launching a 51% attack or collude with other malicious workers or requesters to interfere with the execution of smart contracts. Moreover, the simulation of security analysis in Section 5.1 and Figure 3 has shown that Block-CITE with the PoW consensus mechanism is secure enough. Thus, the proposed scheme, Block-CITE with blockchain, is able to resist malicious miners with an overwhelming probability.

5.3. Blockchain Security

In this subsection, we provide the formal security analysis of the proposed scheme, Block-CITE. The notations for the security analysis can be seen in Table 2.
Theorem 1.
For any time t, the probability that the malicious nodes generate a new block and fork the blockchain in Block-CITE is at most e ( θ λ ) 2 ( T t ) .
Proof. 
Assume that there are totally n nodes in the blockchain network and the percentage of malicious nodes is ϵ . In the proposed scheme, the probability s of a miner (no matter whether honest or malicious) providing a PoW solution follows the exponential distribution, as transactions occur continuously and independently at a constant average rate. The probability s can be represented as follows:
s = 1 e θ λ ,
where λ is the average time latency for a miner to accept the new block and θ is the expiry time for the miner to accept the new block. Additionally, the probability of a miner providing a PoW solution (i.e., generate a new block) is proportional to the computing power (i.e., hashing power) of the miner. Let c be the computation times of all nodes in an epoch; then, the computation power of an honest node can be presented as follows:
P = ( 1 ϵ ) n c s .
And the computational power of malicious nodes can also be represented as follows:
Q = ϵ n c s .
When an honest node becomes the miner, it only accepts one new block in an epoch, no matter how many new blocks are generated in the epoch. However, when a malicious node becomes the miner, it withholds the new blocks instead of broadcasting them to the blockchain network. As such, according to Equations (1)–(3), the probability of honest nodes generating a new block can be presented as follows:
P h = 1 ( 1 s ) ( 1 ϵ ) n s = 1 e θ λ ( 1 ϵ ) n ( 1 e θ λ ) .
Assume that L is the lower bound of the probability that honest nodes generate a new block in an epoch. That is, at any time t, the equation
P h = 1 e θ λ ( 1 ϵ ) n ( 1 e θ λ ) L .
holds, according to Equation (4). Let P ^ denote the number of blocks mined by honest nodes and Q ^ denote the number of blocks mined by malicious nodes. We have the following equation based on Equation (5):
P ^ = P h · c L · c .
According to the Chernoff bounds [44], we have the following equations:
P r [ Q ^ θ λ ( 1 + θ λ ) Q · ( T t ) ] e ( θ λ ) 2 ( T t ) ,
P r [ P ^ ( 1 + θ λ ) P · ( T t ) ] e ( θ λ ) 2 ( T t ) .
According to Equations (6)–(8), we have the following equation under overwhelming probability:
P ^ ( 1 + θ λ ) P · ( T t ) ( 1 + θ λ ) L · ( T t ) > θ λ ( 1 + θ λ ) Q · ( T t ) > Q ^ .
Finally, it can be concluded that the probability for the chain maintained by malicious nodes catching up with the chain maintained by honest nodes is exponentially small in t. □

6. Performance Analysis

In this section, we provide performance analysis in terms of average transaction throughput, average transaction delay, and storage overhead for the proposed scheme.

6.1. Setup

Experiments were conducted on a workstation running a Windows 10 system with Intel(R) Core(TM) i7-8700 CPU @ 3.20 GHz, 16 GB of RAM, a 256 GB SSD, and a 1 TB HDD. Referring to the existing works on blockchain simulation framework in [45,46], etc., we implemented the prototype of the proposed scheme, Block-CITE, and baselines by using the Python programming language, version 3.8, in the PyCharm IDE of the 2020.1.3 Community Edition. Moreover, Block-CITE adopts SHA-256 for hashing and ECDSA with the secp256k1 curve for digital signatures. SHA-256 balances security and efficiency for transaction hashing, while ECDSA reduces on-chain storage via compact keys.
The experimental methodology in this section is similar to that described in the existing works [45,46], etc. Specifically, the experiments were conducted based on Hyperledger Fabric with Docker, in which we implemented the baselines of trademark examinations (a) with double blockchains (the proposed scheme, Block-CITE) and with a single blockchain, (b) with blockchain (the proposed scheme, Block-CITE), and without blockchain. Furthermore, we provide the performance analysis of the above baselines in terms of average transaction throughput, average transaction latency, and storage overhead. Each of the experimental results was averaged over 10 random instances, focusing on the trademark examination processes, with the same hyperparameters (i.e., the generation rate of transactions, the maximum size of the transactions pool, etc.), and the trademark in the experiments adopted a uniformly formatted image in a 2 MB (2048 KB) size. Moreover, the number of transactions, requesters, and workers was set to be the same in each round of the experiment.
The proposed protocol is blockchain-agnostic, and its core mechanisms (e.g., dual-chain data separation and smart contract-based trust evaluation) are designed to be adaptable to both public (PoW/PoS) and permissioned (e.g., Fabric) blockchains, with platform-specific components (e.g., consensus and access control) being modularly adjustable. The reason is that enterprise-level trademark examination requires strict access control to protect sensitive trademark data like original design drafts, efficient consensus, and regulatory compliance, all of which align with Fabric’s permissioned architecture, endorsement policy, and privacy features, making it more suitable for real-world enterprise deployment than public blockchains.

6.2. Transaction Throughput

Transaction throughput per second (TPS) is an essential indicator of the performance of blockchain-based systems. The TPS of Block-CITE is the ratio of the transaction number to the processing time for the transaction. We conducted two experiments on the average transaction throughput in the range of [50, 500] with 50 intervals and in the range of [500, 6000] with 500 intervals. As shown in Figure 4, the proposed scheme, Block-CITE with double blockchains, outperforms the trademark examination scheme with a single blockchain in terms of TPS. The TPS of Block-CITE is higher than that of the trademark examination scheme with a single blockchain by 63.1372% and 64.708% on average in the ranges of [50, 500] and [500, 6000], respectively.
The TPS of the baseline with a single-blockchain structure is more stable than that of the baseline with a double-blockchain structure, because the two blockchains (i.e., TaskChain and RepuChain) rely on each other. Specifically, the TMC needs to query the reputation of workers on RepuChain before creating a task for a requester, and both the TMC and the requester need to score the reputation of the worker after the task is finished and recorded on TaskChain. In the double-blockchain structure, the transaction number of each blockchain is lower than that in the single-blockchain structure. As such, under the premise of the same number of transactions, the time for backtracking transaction records in the double-blockchain structure will be less than that in the single-blockchain structure. Moreover, less time means that more transactions can be dealt with in a time interval, which means that the transaction throughput will be higher. Thus, the time for backtracking transaction records in Block-CITE with double blockchains will be much less than that in the trademark examination scheme with a single blockchain.

6.3. Transaction Delay

Network delay is also an essential indicator for a blockchain-based system, and the average transaction delay is the network delay per transaction in the blockchain network. The transaction delay of a transaction in this section is the summary of creation time, reception time, and insertion time of the transaction. We first conduct a simulation of average transaction delay in terms of the double-blockchain structure (i.e., the proposed scheme, Block-CITE) and the single-blockchain structure. Then we also further explore the average transaction delay in the larger blockchain network with at least 500 nodes and at most 6000 nodes. As shown in Figure 5, Block-CITE with double blockchains outperforms the trademark examination scheme with a single blockchain in terms of average transaction delay. And the TPS of Block-CITE is lower than that of the trademark examination scheme with a single blockchain by 63.6611% and 64.7193% on average in the ranges of [50, 500] with 50 intervals and [500, 6000] with 500 intervals, respectively.
The average transaction delay of the single-blockchain structure is still more stable than that of the double-blockchain structure. However, Block-CITE with a double-blockchain structure has lower transaction latency, because the double-blockchain structure diverts the network traffic of task information and reputation information. In the trademark examination scheme with a single-blockchain structure, the network traffic of the task information and reputation information is generated at the same time, which leads to a higher transaction delay. Moreover, the time for backtracking transaction records (i.e., task records and reputation records) in Block-CITE with a double-blockchain structure is lower than that in the single-blockchain structure. As the number of transactions in two blockchains is less than that in one blockchain, the transactions are divided into two parts and stored in two blockchains. In addition, the generation of a task needs to query the reputation values on RepuChain, while the evaluation of the reputation values requires to completion of the task in TaskChain. Thus, the diversion of network traffic and the less backtracking time (i.e., the faster transaction query speed) can efficiently reduce the transaction delay.

6.4. Storage Overhead

As the blockchain is a decentralized ledger, the storage overhead will influence the performance significantly. The trademark image in the simulation is in a uniform format, while the storage overhead in Block-CITE indicates the additional storage space generated during the trademark examination process. As shown in Figure 6, Block-CITE with blockchain outperforms the centralized trademark examination scheme without blockchain in terms of storage overhead. Specifically, the storage overhead of Block-CITE is lower than that of the centralized trademark examination scheme without blockchain by 42.6606% in the range of [500, 5000] with 500 intervals, on average.
The storage overhead of Block-CITE is derived from the decentralized storage of the double blockchains, while the storage overhead of the centralized trademark examination scheme is derived from the centralized storage of the TMC. In Block-CITE, each node keeps a local copy of TaskChain and RepuChain and stores information (including the hash values) about the tasks and reputation. In the centralized trademark examination scheme without blockchain, the TMC has to centrally store the information of identities for all nodes, the information of tasks, and the information of workers’ reputation. The reason why Block-CITE has a lower storage overhead than the scheme without blockchain is mainly because all the nodes in the centralized trademark examination have to communicate with the centralized TMC, which leads to additional information for the TMC and nodes. Finally, the performance improvement is significant, as the extract overhead can be ignored, although the additional implementation complexity or operational overhead of the double-blockchain structure is higher than that of the single-blockchain structure.

7. Conclusions

This paper proposes the Blockchain-based Crowdsourcing Interactive Trust Evaluation (Block-CITE) method with two blockchains, namely, TaskChain and RepuChain. In Block-CITE, requesters make a deposit and launch a request to the TMC for a trademark application. The TMC selects qualified workers according to their reputation and generates task information. The TMC sends the trademark materials to the workers, and the workers have to return solutions before the deadline. After the TMC receives the solutions, the TMC sends the results to the requesters and computes the reward for the workers and compensation for the requesters. According to the situation of task completion, the TMC and the requesters can score the reputation of the workers. Moreover, all hashes of task information and the reputation of workers are stored on TaskChain and RepuChain, respectively, as proofs to prevent malicious behaviors. Then, a detailed security analysis is presented by conducting a simulation on the 51% attack in the blockchain network and providing a theoretical proof of blockchain security. Finally, several experiments were conducted on industrial trademark examination schemes with blockchain or without blockchain, with a single blockchain or with a double blockchain. Experimental results show that Block-CITE outperforms other baselines in transaction throughput, transaction delay, and storage overhead. Last but not least, based on the promising results of Block-CITE, future work will focus on designing a more efficient cross-chain communication protocol to further reduce the operational overhead introduced by the dual-blockchain architecture.

Author Contributions

All authors contributed to the study’s conception and design. Conceptualization, J.L. and L.J.; methodology, J.L. and L.J.; software, S.W.; validation, H.L. and T.P.; formal analysis, J.L.; investigation, H.L. and T.P.; resources, H.L. and T.P.; data curation, H.L. and T.P.; writing—original draft preparation, J.L.; writing—review and editing, L.J.; visualization, H.W.; supervision, L.J.; project administration, S.W.; funding acquisition, L.J. and H.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Key Research and Development Program of China under grant 2023YFB2704300, in part by the National Natural Science Foundation of China under grant 62302112, in part by the GuangDong Basic and Applied Basic Research Foundation under grant 2024A1515110035, and in part by the Guangzhou Basic and Applied Basic Research Foundation under grant 2025A04J3378, and in part by the Guangzhou Basic and Applied Basic Research Foundation under Grant 2024A03J0324.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The authors do not have permission to release the data.

Conflicts of Interest

The authors confirm that there are no conflicts of interest.

References

  1. Fu, X.; Wang, H.; Shi, P. A survey of Blockchain consensus algorithms: Mechanism, design and applications. Sci. China Inf. Sci. 2021, 64, 1–15. [Google Scholar]
  2. Ma, Y.; Sun, Y.; Lei, Y.; Qin, N.; Lu, J. A survey of blockchain technology on security, privacy, and trust in crowdsourcing services. World Wide Web 2020, 23, 393–419. [Google Scholar] [CrossRef]
  3. Howe, J. The rise of crowdsourcing. Wired Mag. 2006, 14, 176–183. [Google Scholar]
  4. Chittilappilly, A.I.; Chen, L.; Amer-Yahia, S. A survey of general-purpose crowdsourcing techniques. IEEE Trans. Knowl. Data Eng. 2016, 28, 2246–2266. [Google Scholar] [CrossRef]
  5. Kadadha, M.; Singh, S.; Mizouni, R.; Otrok, H. A Context-Aware Blockchain-Based Crowdsourcing Framework: Open Challenges and Opportunities. IEEE Access 2022, 10, 93659–93673. [Google Scholar] [CrossRef]
  6. Zhang, G.; Yang, Z.; Liu, W. Blockchain-based privacy preserving e-health system for healthcare data in cloud. Comput. Netw. 2022, 203, 108586. [Google Scholar]
  7. Liao, Z.; Ai, J.; Liu, S.; Zhang, Y.; Liu, S. Blockchain-based mobile crowdsourcing model with task security and task assignment. Expert Syst. Appl. 2023, 211, 118526. [Google Scholar] [CrossRef]
  8. Shinde, S.M.; Gurrala, V.R. Securing trustworthy evidence for robust forensic cloud-blockchain environment for immigration management with improved ECC encryption. Expert Syst. Appl. 2023, 229, 120478. [Google Scholar] [CrossRef]
  9. Wan, X.; Teng, Z.; Li, Q.; Deveci, M. Blockchain technology empowers the crowdfunding decision-making of marine ranching. Expert Syst. Appl. 2023, 221, 119685. [Google Scholar] [CrossRef]
  10. Yang, H.; Yang, Z.; Xiang, S.; Zhao, H.; Ackom, E. A Double-Chain Blockchain With Economic Attributes and Network Constraints of Prosumer Transactions. IEEE Trans. Ind. Inform. 2022, 19, 2351–2362. [Google Scholar] [CrossRef]
  11. Wang, W.; Wang, L.; Zhang, P.; Xu, S.; Fu, K.; Song, L.; Hu, S. A privacy protection scheme for telemedicine diagnosis based on double blockchain. J. Inf. Secur. Appl. 2021, 61, 102845. [Google Scholar] [CrossRef]
  12. Ren, W.; Wan, X.; Gan, P. A double-blockchain solution for agricultural sampled data security in Internet of Things network. Future Gener. Comput. Syst. 2021, 117, 453–461. [Google Scholar] [CrossRef]
  13. Li, Z.; Hao, J.; Liu, J.; Wang, H.; Xian, M. An IoT-applicable access control model under double-layer blockchain. IEEE Trans. Circuits Syst. Ii Express Briefs 2020, 68, 2102–2106. [Google Scholar]
  14. Huang, X.; Wu, J.; Li, J.; Xia, C. BEADS: Blockchain-Empowered Auction in Decentralized Storage. In Proceedings of the 2021 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, 30 September–3 October 2021; pp. 368–373. [Google Scholar]
  15. Peng, S.; Hu, X.; Zhang, J.; Xie, X.; Long, C.; Tian, Z.; Jiang, H. An efficient double-layer blockchain method for vaccine production supervision. IEEE Trans. Nanobiosci. 2020, 19, 579–587. [Google Scholar] [CrossRef] [PubMed]
  16. Zhang, Y.; Van der Schaar, M. Reputation-based incentive protocols in crowdsourcing applications. In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2140–2148. [Google Scholar]
  17. Ni, J.; Zhang, A.; Lin, X.; Shen, X.S. Security, privacy, and fairness in fog-based vehicular crowdsensing. IEEE Commun. Mag. 2017, 55, 146–152. [Google Scholar] [CrossRef]
  18. Zhang, X.; Xue, G.; Yu, R.; Yang, D.; Tang, J. Keep your promise: Mechanism design against free-riding and false-reporting in crowdsourcing. IEEE Internet Things J. 2015, 2, 562–572. [Google Scholar]
  19. Lu, Z.; Wang, Y.; Tong, X.; Mu, C.; Chen, Y.; Li, Y. Data-driven many-objective crowd worker selection for mobile crowdsourcing in industrial IoT. IEEE Trans. Ind. Inform. 2021, 19, 531–540. [Google Scholar] [CrossRef]
  20. Ma, R.; Feng, T.; Xiong, J.; Li, Q.; Tian, Y. DScPA: A Dynamic Sub-cluster Privacy-preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT. IEEE Internet Things J. 2023, 11, 1880–1892. [Google Scholar] [CrossRef]
  21. Zhang, S.; Wu, J.; Lu, S. Minimum makespan workload dissemination in DTNs: Making full utilization of computational surplus around. In Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Bangalore, India, 29 July 2–1 August 2013; pp. 293–296. [Google Scholar]
  22. Yang, P.; Li, Q.; Yan, Y.; Li, X.Y.; Xiong, Y.; Wang, B.; Sun, X. “Friend is treasure”: Exploring and exploiting mobile social contacts for efficient task offloading. IEEE Trans. Veh. Technol. 2015, 65, 5485–5496. [Google Scholar] [CrossRef]
  23. Cheung, M.H.; Southwell, R.; Hou, F.; Huang, J. Distributed time-sensitive task selection in mobile crowdsensing. In Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hangzhou, China, 22–25 June 2015; pp. 157–166. [Google Scholar]
  24. Wang, X.; Tushar, W.; Yuen, C.; Zhang, X. Promoting users’ participation in mobile crowdsourcing: A distributed truthful incentive mechanism (DTIM) approach. IEEE Trans. Veh. Technol. 2020, 69, 5570–5582. [Google Scholar] [CrossRef]
  25. Li, M.; Wu, J.; Wang, W.; Zhang, J. Toward privacy-preserving task assignment for fully distributed spatial crowdsourcing. IEEE Internet Things J. 2021, 8, 13991–14002. [Google Scholar] [CrossRef]
  26. Xu, Y.; Xiao, M.; Liu, A.; Wu, J. Edge resource prediction and auction for distributed spatial crowdsourcing with differential privacy. IEEE Internet Things J. 2022, 9, 15554–15569. [Google Scholar] [CrossRef]
  27. Hasan, F.A.; Ashqar, H.I.; AlSobeh, A.; Darwish, O. Blockchain-Based National Digital Identity Framework–Case of Palestine. In Proceedings of the 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS), Dubrovnik, Croatia, 24–27 September 2024; pp. 76–83. [Google Scholar]
  28. AlSobeh, A.M.; Magableh, A.A. BlockASP: A framework for AOP-based model checking blockchain system. IEEE Access 2023, 11, 115062–115075. [Google Scholar] [CrossRef]
  29. AlSobeh, A. OSM: Leveraging model checking for observing dynamic 1 behaviors in aspect-oriented applications. arXiv 2024, arXiv:2403.01349. [Google Scholar] [CrossRef]
  30. Harasees, A.; Al-Ahmad, B.; Alsobeh, A.; Abuhussein, A. A secure IoT framework for remote health monitoring using fog computing. In Proceedings of the 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS), Dubrovnik, Croatia, 24–27 September 2024; pp. 17–24. [Google Scholar]
  31. Li, M.; Weng, J.; Yang, A.; Lu, W.; Zhang, Y.; Hou, L.; Liu, J.N.; Xiang, Y.; Deng, R.H. CrowdBC: A blockchain-based decentralized framework for crowdsourcing. IEEE Trans. Parallel Distrib. Syst. 2018, 30, 1251–1266. [Google Scholar]
  32. Zou, J.; Ye, B.; Qu, L.; Wang, Y.; Orgun, M.A.; Li, L. A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services. IEEE Trans. Serv. Comput. 2018, 12, 429–445. [Google Scholar]
  33. Yang, M.; Zhu, T.; Liang, K.; Zhou, W.; Deng, R.H. A blockchain-based location privacy-preserving crowdsensing system. Future Gener. Comput. Syst. 2019, 94, 408–418. [Google Scholar]
  34. Tong, W.; Dong, X.; Shen, Y.; Zhang, Y.; Jiang, X.; Tian, W. CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain. Future Gener. Comput. Syst. 2022, 131, 279–291. [Google Scholar] [CrossRef]
  35. Fu, S.; Huang, X.; Liu, L.; Luo, Y. BFCRI: A Blockchain-Based Framework for Crowdsourcing With Reputation and Incentive. IEEE Trans. Cloud Comput. 2022, 11, 2158–2174. [Google Scholar] [CrossRef]
  36. Wang, W.; Wang, Y.; Duan, P.; Liu, T.; Tong, X.; Cai, Z. A triple real-time trajectory privacy protection mechanism based on edge computing and blockchain in mobile crowdsourcing. IEEE Trans. Mob. Comput. 2022, 22, 5625–5642. [Google Scholar] [CrossRef]
  37. Nakamoto, S.; Bitcoin, A. A peer-to-peer electronic cash system. Bitcoin 2008, 4, 15. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 11 September 2025).
  38. Szabo, N. Smart contracts: Building blocks for digital markets. EXTROPY J. Transhumanist Thought 1996, 18, 28. [Google Scholar]
  39. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Pap. 2014, 151, 1–32. Available online: https://cryptodeep.ru/doc/paper.pdf (accessed on 11 September 2025).
  40. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich, Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15. [Google Scholar]
  41. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  42. Miller, V.S. Use of elliptic curves in cryptography. In Proceedings of the Conference on the Theory and Application of Cryptographic Techniques, Linz, Austria, 9–11 April 1985; Springer: Berlin/Heidelberg, Germany, 1985; pp. 417–426. [Google Scholar]
  43. Zhang, J.; Hong, Z.; Qiu, X.; Zhan, Y.; Guo, S.; Chen, W. Skychain: A deep reinforcement learning-empowered dynamic blockchain sharding system. In Proceedings of the 49th International Conference on Parallel Processing, Edmonton, AB, Canada, 17–20 August 2020; pp. 1–11. [Google Scholar]
  44. Garay, J.; Kiayias, A.; Leonardos, N. The bitcoin backbone protocol: Analysis and applications. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26–30 April 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 281–310. [Google Scholar]
  45. Alharby, M.; Van Moorsel, A. Blocksim: A simulation framework for blockchain systems. ACM Sigmetrics Perform. Eval. Rev. 2019, 46, 135–138. [Google Scholar] [CrossRef]
  46. Kalodner, H.; Möser, M.; Lee, K.; Goldfeder, S.; Plattner, M.; Chator, A.; Narayanan, A. {BlockSci}: Design and applications of a blockchain analysis platform. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August; 2020; pp. 2721–2738. [Google Scholar]
Figure 1. The system model of the proposed scheme.
Figure 1. The system model of the proposed scheme.
Ai 06 00245 g001
Figure 2. The flowchart of the proposed scheme.
Figure 2. The flowchart of the proposed scheme.
Ai 06 00245 g002
Figure 3. The probability of attackers catching up from z blocks behind.
Figure 3. The probability of attackers catching up from z blocks behind.
Ai 06 00245 g003
Figure 4. Average transaction throughput of double blockchains (Block-CITE) and single blockchain in the ranges of 50 to 500 and 500 to 6000.
Figure 4. Average transaction throughput of double blockchains (Block-CITE) and single blockchain in the ranges of 50 to 500 and 500 to 6000.
Ai 06 00245 g004
Figure 5. Average network latency of double blockchains (Block-CITE) and single blockchain in the ranges of 50 to 500 and 500 to 6000.
Figure 5. Average network latency of double blockchains (Block-CITE) and single blockchain in the ranges of 50 to 500 and 500 to 6000.
Ai 06 00245 g005
Figure 6. Average storage overhead for each node in Block-CITE with blockchain and the centralized TMC without blockchain.
Figure 6. Average storage overhead for each node in Block-CITE with blockchain and the centralized TMC without blockchain.
Ai 06 00245 g006
Table 1. Notations for Protocol.
Table 1. Notations for Protocol.
SymbolMeaning
nTotal number of nodes in the blockchain network
MPlaintext of the trademark material
M E Ciphertext of the trademark material
m i ith data block of M
e i Encrypted data block of m i
τ i Digital signature of e i
Φ i Set of τ i
I n f o Information of a trademark application
t i ith task of trademark application
T a s k s Set of t i
R i ith requester
W i ith worker
s i Solution of the ith task
S o l u t i o n s Set of s i
t a s k on Number of tasks finished in time
t a s k over Number of tasks finished over time
P a y m e n t Payment that a task needs to pay
R e p u r Reputation of the worker scored by the requester
R e p u TMC Reputation of the worker scored by the TMC
b c h e a d Head of the block at the current epoch
n o n c e Random number in the blockhead at the current epoch
Table 2. Notations for Security Analysis.
Table 2. Notations for Security Analysis.
SymbolMeaning
nNumber of total nodes
ϵ Percentage of malicious nodes
sProbability of a miner providing a PoW solution
λ Average time latency to accept the new block for a miner
zNumber of blocks that malicious node lags behind the longest chain
cComputation times in a round
TCurrent time
PComputation power of honest nodes
QComputation power of malicious nodes
P h Probability of honest nodes generating a new block
LLower bound of the probability that honest nodes generate the new block in a round
P ^ Number of blocks mined by honest nodes
Q ^ Number of blocks mined by malicious blocks
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, J.; Jiang, L.; Liang, H.; Peng, T.; Wang, S.; Wei, H. Block-CITE: A Blockchain-Based Crowdsourcing Interactive Trust Evaluation. AI 2025, 6, 245. https://doi.org/10.3390/ai6100245

AMA Style

Li J, Jiang L, Liang H, Peng T, Wang S, Wei H. Block-CITE: A Blockchain-Based Crowdsourcing Interactive Trust Evaluation. AI. 2025; 6(10):245. https://doi.org/10.3390/ai6100245

Chicago/Turabian Style

Li, Jiaxing, Lin Jiang, Haoxian Liang, Tao Peng, Shaowei Wang, and Huanchun Wei. 2025. "Block-CITE: A Blockchain-Based Crowdsourcing Interactive Trust Evaluation" AI 6, no. 10: 245. https://doi.org/10.3390/ai6100245

APA Style

Li, J., Jiang, L., Liang, H., Peng, T., Wang, S., & Wei, H. (2025). Block-CITE: A Blockchain-Based Crowdsourcing Interactive Trust Evaluation. AI, 6(10), 245. https://doi.org/10.3390/ai6100245

Article Metrics

Back to TopTop