Skip to main content
Top

2022 | OriginalPaper | Chapter

Distributed Ledger Technology and Fully Homomorphic Encryption: Next-Generation Information-Sharing for Supply Chain Efficiency

Authors : Daniel P. Hellwig, Arnd Huchzermeier

Published in: Innovative Technology at the Interface of Finance and Operations

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Information-sharing facilitates the coordination of supply chains and can be essential for enterprises’ survival. Studies have shown that supply chains benefit from the availability of aggregated information (e.g., inventory levels), as that would facilitate planning, inform decisions, and limit the emergence of operational distortions that result from the bullwhip effect and inefficient inventory allocation. Despite this, the degree of supply chain transparency within and across companies remains deficient at best, even as advancements in information and communication technology have facilitated secure information-sharing. What is more important is that companies have a direct incentive not to share certain operational attributes (e.g., inventory levels or sales, order sizes, wholesale prices). The issues resulting from technology limitations and irrational ordering- and allocation processes were brought into acute focus during the 2020 COVID-19 (C-19) pandemic, manifesting as persistent and global disruptions in supply operations and delivery delays. This chapter outlines promising approaches and methodologies for resolving these chronic shortcomings by leveraging both distributed ledger (“Blockchain”) technology (DLT) and the newly emerging capabilities of fully homomorphic encryption (FHE). By employing zero-trust information-sharing, we present an approach that combines DLT with FHE to bridge information-sharing limitations in hyperconnected supply chains without compromising data control. The chapter also introduces real-world applications of both DLT and FHE to illustrate their transformative potential. We conclude by highlighting the practical benefits of implementing both technologies, as well as the implications for broader adoption.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Blanchard, O. (1983). The production and inventory behavior of the American automobile industry. The Journal of Political Economy, 91(3), 365–400.CrossRef Blanchard, O. (1983). The production and inventory behavior of the American automobile industry. The Journal of Political Economy, 91(3), 365–400.CrossRef
go back to reference Boneh, D., Gentry, C., Halevi, S., Wang, F., & Wu, D. J. (2013). Private database queries using somewhat homomorphic encryption. In M. Jacobson, M. Locasto, P. Mohassel, & R. Safavi-Naini (Eds.), Applied Cryptography and Network Security. ACNS 2013 (Lecture notes in computer science, Vol. 7954). Springer. https://doi.org/10.1007/978-3-642-38980-1_7 CrossRef Boneh, D., Gentry, C., Halevi, S., Wang, F., & Wu, D. J. (2013). Private database queries using somewhat homomorphic encryption. In M. Jacobson, M. Locasto, P. Mohassel, & R. Safavi-Naini (Eds.), Applied Cryptography and Network Security. ACNS 2013 (Lecture notes in computer science, Vol. 7954). Springer. https://​doi.​org/​10.​1007/​978-3-642-38980-1_​7 CrossRef
go back to reference Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2011). Fully Homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (TOCT), 6(3), 1–36. Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2011). Fully Homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (TOCT), 6(3), 1–36.
go back to reference Bray, R., & Mendelson, H. (2012a). Information transmission and the bullwhip effect: An empirical investigation. Management Science, 58(5), 860–875.CrossRef Bray, R., & Mendelson, H. (2012a). Information transmission and the bullwhip effect: An empirical investigation. Management Science, 58(5), 860–875.CrossRef
go back to reference Cachon, G. P., & Fisher, M. (2000). Supply chain inventory management and the value of shared information. Management Science, 46(8), 1032–1048.CrossRef Cachon, G. P., & Fisher, M. (2000). Supply chain inventory management and the value of shared information. Management Science, 46(8), 1032–1048.CrossRef
go back to reference Forrester, W. (1958). Industrial dynamics: A major breakthrough for decision makers. Harvard Business Review, 36, 37–66. Forrester, W. (1958). Industrial dynamics: A major breakthrough for decision makers. Harvard Business Review, 36, 37–66.
go back to reference Funda, S., & Robinson, E. P. (2002). Flow coordination and information sharing in supply chains: Review, implications, and directions for future research. Decision Sciences, 33, 505–536.CrossRef Funda, S., & Robinson, E. P. (2002). Flow coordination and information sharing in supply chains: Review, implications, and directions for future research. Decision Sciences, 33, 505–536.CrossRef
go back to reference Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Symposium on the Theory of Computing (STOC), 169–178. Gentry, C. (2009). Fully homomorphic encryption using ideal lattices. Symposium on the Theory of Computing (STOC), 169–178.
go back to reference Hellwig, D. P., Karlic, G., & Huchzermeier, A. (2020). Build your own blockchain: A practical guide to distributed ledger technology. Springer Nature.CrossRef Hellwig, D. P., Karlic, G., & Huchzermeier, A. (2020). Build your own blockchain: A practical guide to distributed ledger technology. Springer Nature.CrossRef
go back to reference Hewitt, C. (2008). ORGs for scalable, robust, privacy-friendly client cloud computing. IEEE Educational Activities Department. Hewitt, C. (2008). ORGs for scalable, robust, privacy-friendly client cloud computing. IEEE Educational Activities Department.
go back to reference Isaksson, O., & Seifert, R. (2016). Quantifying the bullwhip effect using two-echelon data: A cross-industry empirical investigation. International Journal of Production Economics, 171, 311–320.CrossRef Isaksson, O., & Seifert, R. (2016). Quantifying the bullwhip effect using two-echelon data: A cross-industry empirical investigation. International Journal of Production Economics, 171, 311–320.CrossRef
go back to reference Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978a). On data banks and privacy homomorphisms. In Foundations of secure computation (pp. 169–180). Academia Press. Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978a). On data banks and privacy homomorphisms. In Foundations of secure computation (pp. 169–180). Academia Press.
go back to reference Tate, L., & Ellram, L. (2019). Supply chain finance: Risk management, resilience and supplier management. Kogan Page. Tate, L., & Ellram, L. (2019). Supply chain finance: Risk management, resilience and supplier management. Kogan Page.
go back to reference Taylor, D. A., & Brunt, D. (2010). Manufacturing operations and supply chain management: The lean approach. Cengage Learning. Taylor, D. A., & Brunt, D. (2010). Manufacturing operations and supply chain management: The lean approach. Cengage Learning.
Metadata
Title
Distributed Ledger Technology and Fully Homomorphic Encryption: Next-Generation Information-Sharing for Supply Chain Efficiency
Authors
Daniel P. Hellwig
Arnd Huchzermeier
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-81945-3_2