Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,395)

Search Parameters:
Keywords = smart contract

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 1051 KB  
Article
Aligning Incentives in Public Lending: The KfW COVID-19 Experience—Proposals for Improving Public Lending
by Guenter Franke and Jan Pieter Krahnen
J. Risk Financial Manag. 2026, 19(3), 190; https://doi.org/10.3390/jrfm19030190 - 5 Mar 2026
Abstract
This paper aims to present proposals for improving public lending design in an economic crisis. It combines casual empirical observations, institutional analysis and normative theoretical modeling. We obtain casual evidence from the analysis of the emergency lending scheme offered by Germany’s national development [...] Read more.
This paper aims to present proposals for improving public lending design in an economic crisis. It combines casual empirical observations, institutional analysis and normative theoretical modeling. We obtain casual evidence from the analysis of the emergency lending scheme offered by Germany’s national development bank (NDB) KfW during the COVID-19 crisis. We identify obstacles to efficient contracting in these two-tier lending relationships, involving the NDB, the participating commercial banks, and the ultimate firm borrowers. Theoretical arguments and empirical evidence based on this case study help to understand major incentive risks of subsidized public lending schemes. To counter these risks, we propose a smart set of public lending contracts which induces banks to refrain from applying for public support for financially strong firms and for non-viable zombie firms. For firms which need financial support, we propose a set of public contracts from which the firm chooses the contract which maximizes its subsidy, reveals its rating, and obtains public funds according to its crisis-induced needs. This partially revealing signaling equilibrium implies higher interest rates for firms with a need for more public funding, thereby mitigating information asymmetries. In order to ensure incentive alignment, banks should retain a share of borrower default risk. Full article
(This article belongs to the Special Issue Banking Stability and Management of Financial Institutions)
Show Figures

Figure 1

13 pages, 1261 KB  
Article
Tokenized Gold in Crypto Markets: Tracking Accuracy and Portfolio Performance
by Muhammad Ashfaq, Maximilian Pfeifer, Tan Gürpinar and Mehmet Akif Gulum
FinTech 2026, 5(1), 19; https://doi.org/10.3390/fintech5010019 - 2 Mar 2026
Viewed by 100
Abstract
This paper examines the relationship between traditional gold (XAU) and its tokenized counterparts (PAXG and XAUT), providing an empirical assessment of how digital representations of real-world assets align with their underlying benchmarks. Using multi-year time series data, the study evaluates price deviations, tracking [...] Read more.
This paper examines the relationship between traditional gold (XAU) and its tokenized counterparts (PAXG and XAUT), providing an empirical assessment of how digital representations of real-world assets align with their underlying benchmarks. Using multi-year time series data, the study evaluates price deviations, tracking accuracy, correlations, and volatility across both weekday-only and 24/7 trading datasets, incorporating weekend effects and crypto-market microstructure. Results show that both tokenized assets exhibit strong long-term alignment with XAU, while short-term divergences arise from continuous crypto trading, liquidity fragmentation, and issuer-specific design features, with XAUT consistently tracking spot gold more closely than PAXG. Building on this analysis, the paper examines the role of tokenized gold within dynamic, smart contract-driven crypto portfolios that also include BTC, ETH, and cash. Portfolio simulations demonstrate that adaptive rebalancing strategies materially improve risk-adjusted performance, with XAUT serving as a stabilizing anchor and cash enabling rapid, automated repositioning during volatility spikes. The findings offer a dual contribution: they clarify the fidelity and market behavior of tokenized gold and provide evidence of its practical utility within automated, on-chain portfolio management, highlighting both its strengths and structural limitations in emerging digital financial systems. Full article
Show Figures

Figure 1

14 pages, 392 KB  
Review
Distributed Trust in the Age of Malware Blockchain Applications
by Paul A. Gagniuc, Maria-Iuliana Dascălu and Ionel-Bujorel Păvăloiu
Algorithms 2026, 19(3), 185; https://doi.org/10.3390/a19030185 - 2 Mar 2026
Viewed by 87
Abstract
Blockchain technology is redefining the foundations of cybersecurity by introducing decentralized, tamper-resistant mechanisms for data integrity, trust management, and malware intelligence sharing. Traditional detection systems, which are dependent on centralized control and opaque validation, remain vulnerable to data manipulation and systemic compromise. The [...] Read more.
Blockchain technology is redefining the foundations of cybersecurity by introducing decentralized, tamper-resistant mechanisms for data integrity, trust management, and malware intelligence sharing. Traditional detection systems, which are dependent on centralized control and opaque validation, remain vulnerable to data manipulation and systemic compromise. The integration of blockchain transforms these paradigms because it provides verifiable provenance, distributed consensus, and autonomous enforcement through smart contracts. This review synthesizes fifteen years of progress (2010–2025) at the intersection of blockchain and malware detection and discusses core architectures, consensus protocols, and cryptographic properties that underpin decentralized defenses. The review follows a structured literature review methodology, which focuses on blockchain architectures, consensus protocols, and malware-detection pipelines reported in the cybersecurity literature. It also analyzes blockchain detection pipelines, performance tradeoffs, and data protection mechanisms in distributed learning systems and artificial intelligence models. Special attention is given to scalability constraints, regulatory compliance, and interoperability challenges that shape adoption. The review identifies three dominant design patterns: (i) decentralized threat-intelligence sharing with provenance guarantees, (ii) consensus-driven validation of malware artifacts, and (iii) on-chain trust and reputation mechanisms for detector accountability. Through the union of blockchain, artificial intelligence, edge computation, and federated learning, cybersecurity attains an auditable and adaptive architecture resilient to adversarial threats. The study concludes that blockchain provides a verifiable trust infrastructure for malware detection, but its practical deployment requires faster transaction validation and stronger protection of sensitive data; future research should address performance optimization and regulatory compliance. Full article
Show Figures

Figure 1

32 pages, 6460 KB  
Article
Blockchain Security Using Confidentiality, Integrity, and Availability for Secure Communication
by Chukwuebuka Francis Ikenga-Metuh and Abel Yeboah-Ofori
Blockchains 2026, 4(1), 3; https://doi.org/10.3390/blockchains4010003 - 28 Feb 2026
Viewed by 117
Abstract
Background: Blockchain technology has emerged as a transformative communication solution for securing distributed systems. However, several vulnerabilities exist during transactions, including latency and network congestion issues during mempool processing, topology weaknesses, cross-chain bridge exploits, and cryptographic weaknesses. These vulnerabilities have led to [...] Read more.
Background: Blockchain technology has emerged as a transformative communication solution for securing distributed systems. However, several vulnerabilities exist during transactions, including latency and network congestion issues during mempool processing, topology weaknesses, cross-chain bridge exploits, and cryptographic weaknesses. These vulnerabilities have led to attacks that have threatened system integrity, including Block Extractable Value (BEV) attacks, Maximal Extractable Value (MEV) attacks, sandwich attacks, liquidation, and Decentralized Finance (DeFi) reordering attacks, among others. Thus, implementing a robust security framework based on the Confidentiality, Integrity, and Availability (CIA) triad remains critical for addressing modern blockchain technology threats. Objective: This paper examines blockchain technology, its various vulnerabilities, and attacks to determine how criminals exploit the system during transactions. Further, it evaluates its impact on users. Then, implement a blockchain attack in a “MasterChain” virtual environment to demonstrate how vulnerable spots can be practically exploited and discuss the application of the CIA security triad through modern cryptographic primitives. Methods: The approach considers Hevner’s design science framework, which emphasizes creating innovative artifacts that address identified problems while contributing to the knowledge base through rigorous evaluation. Furthermore, we developed a MasterChain tool using Python with Flask for distributed node communication, utilizing the Elliptic Curve Digital Signature Algorithm (ECDSA) with the Standards for Efficient Cryptography Prime 256-bit Koblitz curve 1 (secp256k1) for digital signatures and Secure Hash Algorithm 3 (SHA-3) (Keccak-256) hashing for block integrity. Results: show how the CIA has been implemented to provide secure communication through ECDSA-based transactions, SHA-3 chain integrity verification, and a multi-node distributed architecture, respectively. The performance analysis shows that ECDSA provides 256-bit security with 64-byte signatures compared to 2048-bit Rivest–Shamir–Adleman (RSA)’s 256-byte signatures, achieving a 75% reduction in bandwidth overhead. SHA-3 provides immunity to length extension attacks while maintaining equivalent collision resistance to SHA-256. Conclusions: The MasterChain framework provides a practical foundation for implementing blockchain security that addresses both classical and emerging vulnerabilities. The adoption of ECDSA and SHA-3 (Keccak-256) positions the system favourably for modern blockchain applications, while providing insights into the cryptographic trade-offs between performance, security, and compatibility. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains 2025)
Show Figures

Figure 1

27 pages, 1484 KB  
Review
The Role of Blockchain Technology in Reducing Information Asymmetry and Enhancing Trust in Circular Construction
by Anita Cerić and Ivona Ivić Jazvec
Sustainability 2026, 18(5), 2328; https://doi.org/10.3390/su18052328 - 28 Feb 2026
Viewed by 200
Abstract
This paper explores the role of blockchain technology in reducing information asymmetry and improving trust in the context of circular construction. In the construction industry, especially when applying circular economy principles, many stakeholders suffer from lack of transparency and poor data sharing. This [...] Read more.
This paper explores the role of blockchain technology in reducing information asymmetry and improving trust in the context of circular construction. In the construction industry, especially when applying circular economy principles, many stakeholders suffer from lack of transparency and poor data sharing. This often causes mistrust and inefficient collaboration. Blockchain, as a decentralized and secure technology, can solve this problem by creating transparent, traceable, and immutable records of material flows, contracts, and processes. However, there is a lack of scientific evidence in understanding the blockchain’s role in building trust and reducing information asymmetry in circular construction. This study reviews recent literature where the blockchain is applied to circular construction, finds the current gaps, and proposes future directions for research on this topic. It identifies critical technical, organizational, and legal barriers while outlining a clear pathway for overcoming them. By addressing these challenges, the blockchain can evolve into a central enabler of circular, sustainable, and trustworthy construction, offering a decisive reference point for guiding adoption, standardization, and industry-wide implementation. Full article
Show Figures

Figure 1

33 pages, 6232 KB  
Article
Access Control Development Within the Framework of an IOTA-Based Electronic Medical Record Management System
by Hari Purnama, I Putu Bakta Hari Sudewa, Tazkia Nizami, Bagas Sambega Rosyada, Pradipta Rafa Mahesa and Nur Ahmadi
Sensors 2026, 26(5), 1422; https://doi.org/10.3390/s26051422 - 24 Feb 2026
Viewed by 207
Abstract
Electronic Medical Records (EMRs) are mandatory in Indonesia following the Ministry of Health regulation, which raises significant challenges in data security and patient-centric access control. Current implementations rely on centralized healthcare systems or third-party vendors, creating risks of unauthorized access, data leakage, and [...] Read more.
Electronic Medical Records (EMRs) are mandatory in Indonesia following the Ministry of Health regulation, which raises significant challenges in data security and patient-centric access control. Current implementations rely on centralized healthcare systems or third-party vendors, creating risks of unauthorized access, data leakage, and uncertain data integrity. To address these issues, this study proposes DecMed, a decentralized EMR management framework built on IOTA Distributed Ledger Technology (DLT). DecMed integrates Capability-Based Access Control (CapBAC), Proxy Re-Encryption (PRE), and the InterPlanetary File System (IPFS) to enforce patient ownership of medical data. Patients actively grant or revoke access, define access duration, and selectively share data with healthcare personnel. The system is implemented using smart contracts in the Move programming language on the IOTA ledger, while encrypted clinical data is stored on IPFS. Evaluation through unit testing of various unauthorized access scenarios demonstrates that DecMed effectively enforces fine-grained access rules, preserves data confidentiality and integrity, and ensures compliance with national healthcare requirements. Full article
(This article belongs to the Special Issue Securing E-Health Data Across IoMT and Wearable Sensor Networks)
Show Figures

Figure 1

31 pages, 927 KB  
Article
Static Analysis Techniques for Embedded, Cyber-Physical, and Electronic Software Systems: A Comprehensive Survey
by Maksim Iavich, Tamari Kuchukhidze and Audrius Lopata
Electronics 2026, 15(5), 918; https://doi.org/10.3390/electronics15050918 - 24 Feb 2026
Viewed by 355
Abstract
Static analysis is a critical methodology for ensuring the quality, security, and safety of embedded, cyber-physical, and electronic software systems, particularly as such systems become increasingly complex and tightly coupled with hardware and real-time constraints. Through a systematic study of the literature, this [...] Read more.
Static analysis is a critical methodology for ensuring the quality, security, and safety of embedded, cyber-physical, and electronic software systems, particularly as such systems become increasingly complex and tightly coupled with hardware and real-time constraints. Through a systematic study of the literature, this paper summarizes the State-of-the-Art in static program analysis. We develop a comprehensive taxonomy of fundamental techniques, including model checking, abstract interpretation, data-flow analysis, and symbolic execution, and examine their application in modern analysis tools used in electronic and safety-critical systems. The survey thoroughly reviews applications across key domains, including vulnerability detection, automotive and embedded software verification, smart contract auditing, and AI-enabled electronic systems. We also critically analyze persistent challenges, including tool integration, scalability limitations, and the trade-off between analysis precision and soundness. Finally, by discussing emerging trends and future research directions—such as machine-learning-enhanced analysis and hybrid static–dynamic techniques—this work provides a structured framework to guide future research and industrial practice in the development of reliable electronic systems. Full article
Show Figures

Figure 1

33 pages, 5295 KB  
Article
Payment Rails in Smart Contract as a Service (SCaaS) Solutions from BPMN Models
by Christian Gang Liu, Peter Bodorik and Dawn Jutla
Future Internet 2026, 18(2), 110; https://doi.org/10.3390/fi18020110 - 19 Feb 2026
Viewed by 292
Abstract
The adoption of blockchain-based smart contracts for the trading of goods and services promises greater transparency, automation, and trustlessness, but also raises challenges related to payment integration and modularity. While business analysts (BAs) can express business logic and control flow using BPMN and [...] Read more.
The adoption of blockchain-based smart contracts for the trading of goods and services promises greater transparency, automation, and trustlessness, but also raises challenges related to payment integration and modularity. While business analysts (BAs) can express business logic and control flow using BPMN and decision rules using DMN, payment tasks that involve concrete transfers (on-chain, off-chain, cross-chain, or hybrid) require careful implementation by developers due to platform-specific constraints and semantic richness. To address this separation of concerns, we introduce a methodology within the context of the smart contract-as-a-service (SCaaS) approach that supports (1) identifying and mapping generic payment tasks in BPMN to pre-deployed payment smart contracts, (2) augmenting BPMN models with matching payment fragments from a pattern repository, and (3) automatically transforming the augmented models into smart contracts that invoke the appropriate payment services. Our approach builds on prior work in automated BPMN-to-smart contract transformation using Discrete Event–Hierarchical State Machine (DE-HSM) multi-modal modeling to capture process semantics and nested transactions, while enabling payment service reuse, extensibility, and the separation of concerns. We illustrate this methodology via representative use cases spanning conventional, DeFi, and cross-chain payments, and discuss the implications for modular contract deployment and maintainability. Full article
Show Figures

Graphical abstract

23 pages, 5282 KB  
Article
IoT-SBIdM: A Privacy-Preserving Stateless Blockchain-Based Identity Management for Trustworthy Internet of Things IoT Ecosystems
by Eman Alatawi, Anoud Alhawiti, Doaa Albalawi and Umar Albalawi
Mathematics 2026, 14(4), 715; https://doi.org/10.3390/math14040715 - 18 Feb 2026
Viewed by 350
Abstract
The rapid expansion of the Internet of Things (IoT) has led to billions of interconnected devices generating and exchanging sensitive data across diverse domains, which introduces challenges in identity management (IdM) regarding privacy, scalability, and verifiability. While blockchain technology provides decentralization and tamper [...] Read more.
The rapid expansion of the Internet of Things (IoT) has led to billions of interconnected devices generating and exchanging sensitive data across diverse domains, which introduces challenges in identity management (IdM) regarding privacy, scalability, and verifiability. While blockchain technology provides decentralization and tamper resistance, its transparency and increasing on-chain storage demands make it unsuitable for large-scale IoT identity ecosystems. To overcome these challenges, IoT-SBIdM is proposed as a lightweight, privacy-preserving, and stateless blockchain-based identity management framework designed for IoT environments. This framework incorporates Elliptic Curve Cryptography (ECC)-based accumulators and Zero-Knowledge Proofs (ZKPs) to facilitate selective disclosure, enabling entities to prove credential authenticity without exposing sensitive identity information. Furthermore, the framework adopts W3C-compliant Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) to promote interoperability and user-controlled identity ownership. The experimental results indicate that IoT-SBIdM achieves efficient smart contract execution by reducing gas costs through optimized registry logic. Moreover, the system maintains a compact block size of only 45 MB at higher block heights, outperforming comparable schemes in storage efficiency by achieving a 55% reduction relative to recent models and an approximate 94% reduction relative to older systems, thereby demonstrating superior scalability and storage efficiency, making it suitable for identity management solutions for IoT environments. Full article
(This article belongs to the Special Issue Applied Cryptography and Blockchain Security, 2nd Edition)
Show Figures

Figure 1

16 pages, 818 KB  
Article
Probabilistic Assume–Guarantee Contracts for Islanded Mission-Critical Power System Operations
by Venkatraman Renganathan and Soham Ghosh
Electronics 2026, 15(4), 855; https://doi.org/10.3390/electronics15040855 - 18 Feb 2026
Viewed by 194
Abstract
Design of large-scale power systems is getting increasingly complex nowadays from an operational and reliability standpoint due to the uncertainties associated with the injection of renewables and consumption of load. These uncertainties pose a great challenge in gauging and subsequently obtaining reliable system-level [...] Read more.
Design of large-scale power systems is getting increasingly complex nowadays from an operational and reliability standpoint due to the uncertainties associated with the injection of renewables and consumption of load. These uncertainties pose a great challenge in gauging and subsequently obtaining reliable system-level assurances from subsystem-level guarantees, particularly in mission-critical systems such as those seen in data centers. We propose a formal and modular framework of probabilistic assume–guarantee contracts (PAGCs) for compositional reasoning and control of uncertain power systems, motivated by the need for resilient and verifiable operation in data center power networks. In contrast to classical contracts, which require absolute satisfaction of assumptions and guarantees, PAGCs allow for high-probability satisfaction under system uncertainty and variability. We formalize the syntax and semantics of PAGCs, develop soundness and compositionality theorems, and demonstrate their applicability to power grid components such as generators, transformers, circuit breakers, and loads. Given the current approval bottlenecks in interconnection requests, a growing number of data center operators are opting for islanded generation configuration. A case study on such a modular islanded data center power system is presented to validate the proposed theory. The proposed PAGC application in power networks is promising in several aspects to solve several existing open problems in distributed systems, particularly in future large-scale smart power networks. Full article
(This article belongs to the Section Systems & Control Engineering)
Show Figures

Figure 1

18 pages, 549 KB  
Review
Beyond Centralized AI: Blockchain-Enabled Decentralized Learning
by Daren Wang, Tengfei Ma, Juntao Zhu and Haihan Duan
Future Internet 2026, 18(2), 98; https://doi.org/10.3390/fi18020098 - 13 Feb 2026
Viewed by 435
Abstract
The dominance of centralized artificial intelligence architectures raises significant concerns regarding privacy, data ownership, and control. These limitations have motivated the development of decentralized learning paradigms that aim to remove reliance on a central authority during model training. While federated learning represents an [...] Read more.
The dominance of centralized artificial intelligence architectures raises significant concerns regarding privacy, data ownership, and control. These limitations have motivated the development of decentralized learning paradigms that aim to remove reliance on a central authority during model training. While federated learning represents an intermediate step by allowing distributed training without raw data exchange, it still depends on a centralized server which could lead to single-point vulnerabilities. Beyond this, a fully decentralized learning in general faces challenges in security vulnerabilities, absence of governance, and lack of incentive alignment. Recent advances in blockchain technology offer a promising foundation for addressing these issues. This paper provides a systematic analysis of blockchain’s mechanism-level roles in security, consensus, smart contract, and incentives to support decentralized learning. By reviewing state-of-the-art approaches, this paper suggests that appropriately designed blockchain architectures have the potential to enable practical, secure, and incentive-compatible decentralized learning as technological capabilities continue to evolve. Full article
Show Figures

Graphical abstract

20 pages, 2104 KB  
Article
Research on Dynamic Spectrum Sharing in the Internet of Vehicles Based on Blockchain and Game Theory
by Xianhao Shen, Mingze Li, Jiazhi Yang and Jinsheng Yi
Sensors 2026, 26(4), 1190; https://doi.org/10.3390/s26041190 - 12 Feb 2026
Viewed by 169
Abstract
With the rapid development of the Internet of Vehicles (IoV), the explosive growth of data traffic within the system has led to a surge in demand for spectrum resources. However, the strict limitations on spectrum supply make the construction of an efficient and [...] Read more.
With the rapid development of the Internet of Vehicles (IoV), the explosive growth of data traffic within the system has led to a surge in demand for spectrum resources. However, the strict limitations on spectrum supply make the construction of an efficient and reasonable resource allocation scheme crucial for IoV. To maximize social benefits and improve security in the resource allocation process under IoV spectrum scarcity, this paper proposes a dynamic spectrum allocation (DSA) scheme based on a consortium blockchain framework. In this scheme, we design a demand-based vehicle priority classification method and propose a novel hybrid consensus mechanism—PhDPoR—which integrates practical byzantine fault tolerance (PBFT) and Hierarchical Delegated Proof of Reputation. Furthermore, we construct a multi-leader, multi-follower (MLMF) Stackelberg game model and utilize smart contracts to implement an immutable on-chain record of spectrum resource allocation, thereby deriving the optimal spectrum pricing and purchase strategy. Experimental results show that the proposed scheme not only effectively optimizes the utility of both supply and demand sides and improves overall social benefits while ensuring efficiency, but also significantly outperforms baseline algorithms in identifying and mitigating malicious nodes, thus verifying its feasibility and application value in complex IoV environments. Full article
(This article belongs to the Special Issue Blockchain Technology for Internet of Things)
Show Figures

Figure 1

13 pages, 2890 KB  
Proceeding Paper
Design and Implementation of Interactive Teaching Materials for Core Blockchain Concepts on OwlSpace Platform as a Capstone Project
by Chin-Ling Chen, Kuang-Wei Zeng, Wei-Ying Li, Tzu-Chuen Lu, Chin-Feng Lee and Ling-Chun Liu
Eng. Proc. 2025, 120(1), 63; https://doi.org/10.3390/engproc2025120063 - 11 Feb 2026
Viewed by 194
Abstract
Blockchain technology, with special features of decentralization, immutability, consensus mechanisms, and smart contracts, has been integrated into different areas of digital applications recently. However, its abstract concepts present a steep learning curve for beginners, especially in the absence of online resources that offer [...] Read more.
Blockchain technology, with special features of decentralization, immutability, consensus mechanisms, and smart contracts, has been integrated into different areas of digital applications recently. However, its abstract concepts present a steep learning curve for beginners, especially in the absence of online resources that offer dynamic, hands-on learning experiences. In response to this problem, we developed a digital interactive teaching tool using the OwlSpace platform to explain what blockchain truly is in its four core foundational concepts. Interactive operations, guided workflows, and visual simulations are applied in the system to assist the learner in interpreting decentralized architectures, immutability of data interactively, the consensus formation process, and the mechanics behind smart contract operation. The system has also put a focus on conceptual understanding and gamified experiences rather than competitive ones, providing a practical and engineering-focused tool for introductory information engineering students. Full article
(This article belongs to the Proceedings of 8th International Conference on Knowledge Innovation and Invention)
Show Figures

Figure 1

28 pages, 4040 KB  
Article
BE-DPFL: A Blockchain-Enhanced Privacy-Preserving Federated Learning Framework for Secure Edge Network Collaboration
by Wangjing Jia and Tao Xie
Appl. Sci. 2026, 16(4), 1791; https://doi.org/10.3390/app16041791 - 11 Feb 2026
Viewed by 170
Abstract
Against the deep integration of digital transformation and AI, cross-institutional collaborative modeling hinges on efficient data circulation, yet data silos and privacy regulations hinder traditional centralized training. Federated Learning (FL) keeps data local but faces issues like weak centralized trust, inadequate privacy protection, [...] Read more.
Against the deep integration of digital transformation and AI, cross-institutional collaborative modeling hinges on efficient data circulation, yet data silos and privacy regulations hinder traditional centralized training. Federated Learning (FL) keeps data local but faces issues like weak centralized trust, inadequate privacy protection, and poor robustness in edge networks. Existing improvements, including via differential privacy (DP) and blockchain, among others, still suffer from centralized budget allocation, low consensus efficiency, or single-point-of-failure addressing, failing to jointly optimize trust, performance, and privacy. The limitations are exacerbated in high-frequency, resource-constrained edge environments. To tackle these challenges, this paper proposes BE-DPFL, a blockchain-enhanced differentially private FL framework that integrates on-chain trusted supervision and off-chain efficient training. It builds a lightweight blockchain trust layer with FL-PBFT consensus and smart contracts, introduces Random Projection–ADMM optimization, and designs a multi-objective adaptive gradient clipping/noise injection strategy. Experiments on CIFAR-10 and ChestX-ray14 demonstrate that BE-DPFL outperforms mainstream methods in consensus efficiency, communication overhead, privacy-accuracy balance, and robustness. It reduces communication costs by over 97%, achieves 100% privacy compliance, and maintains stable performance even under high disturbances. Ablation studies confirm the significant contributions of core components. Full article
Show Figures

Figure 1

30 pages, 5139 KB  
Article
Research on an On-Chain and Off-Chain Collaborative Storage Method Based on Blockchain and IPFS
by Tianqi Zhu, Yuxiang Huang, Zhihong Liang, Mingming Qin, Ruicheng Niu, Yuanyuan Ma and Qi Feng
Future Internet 2026, 18(2), 92; https://doi.org/10.3390/fi18020092 - 10 Feb 2026
Viewed by 343
Abstract
Blockchain technology, with its characteristics of decentralization, immutability, auditability, and traceability, has gradually become a core infrastructure in the digital economy era, demonstrating great potential in fields such as finance, government services, and the Internet of Things (IoT). However, as the scale of [...] Read more.
Blockchain technology, with its characteristics of decentralization, immutability, auditability, and traceability, has gradually become a core infrastructure in the digital economy era, demonstrating great potential in fields such as finance, government services, and the Internet of Things (IoT). However, as the scale of blockchain networks expands and data volumes surge, issues such as full-node storage redundancy, limited transaction throughput, and inefficient synchronization of historical data have become increasingly prominent, severely restricting the large-scale application of blockchain systems. The storage scalability problem faced by blockchain is therefore becoming more critical. To address the challenge in which on-chain storage expansion still cannot meet the demand for large-scale data storage, a storage method combining the InterPlanetary File System (IPFS) with blockchain, referred to as IPFS-BC, is proposed. In IPFS-BC, large-scale raw data are stored in the decentralized and content-addressable IPFS network, while the blockchain only retains the unique content identifier (CID) hash and related metadata. Through smart contracts enabling dynamic permission management and fine-grained access control, efficient interaction and collaborative storage between on-chain and off-chain systems are achieved. In this work, file upload simulation experiments were conducted, and two evaluation indicators—storage space consumption and storage performance (file read/write time and speed)—were used to compare three storage approaches: Distributed Hash Table (DHT)-based off-chain storage, Financial Blockchain Shenzhen Open Source (FISCO BCOS) on-chain storage, and the IPFS-BC on-chain/off-chain collaborative storage model. Experimental results show that the IPFS-BC model reduces storage space consumption by approximately 75% compared with FISCO BCOS blockchain storage when storing file data, significantly decreasing data redundancy. Moreover, IPFS-BC ensures system security during the on-chain process, and through the automated management and auditing provided by smart contracts, it effectively enhances system security and realizes scalable on-chain/off-chain collaborative storage. Full article
(This article belongs to the Special Issue Advances in Multimedia Information System Security)
Show Figures

Figure 1

Back to TopTop