stock exchange or with any party of the China Securities
Regulatory Commission, since the stock exchange or
the China Securities Regulatory Commission can only
obtain at most, there is no way to obtain the identity,
and there is still no need to worry about the exposure of
the identity under the risk of the original content being
leaked problem.
Key theft issue: Investors, brokerage firms, stock ex-
changes, and the China Securities Regulatory Commis-
sion each keep their own keys. Although their public
keys are public, hackers cannot use known public keys
to calculate the corresponding keys, a discrete logarithm
problem of the Definition 1, has been charged part
narrative. Unless any party who owns the key reveals
the key held by himself, this research does not consider
this assumption.
This research is mainly about the four-party supervi-
sion and management plan of investors, securities firms,
stock exchanges, and the China Securities Regulatory
Commission. The improved ElGamal algorithm is used
in the application of the securities industry regulatory in-
formation system. This information system is anonymous
and the identity of any investor is strictly controlled.
Keep it secret. If the brokerage (system) is invaded, hack-
ers cannot obtain investor transaction content through the
brokerage. If the hacker colludes with any of the regula-
tory agencies to deceive, he still does not have to worry
about identity exposure. If the investor has breached the
contract, the manager and the system center can track
the anonymous identity under certain conditions, and
finally restore the anonymous identity to the real-name
user identity. In this way, the investor’s security can be
protected. The identity is protected from exposure, and
on the other hand, it can deter investors from maliciously
defaulting on transactions. This program has the best of
both worlds. This research plan puts forward 6 lemmas, 3
definitions and 19 equations to run through the full text,
provide a strong theoretical support for the thesis, and
finally put this idea into reality. The real system proposes
a securities industry supervision system with anonymity,
non-modification, security, and double-blind mechanism
to achieve a combination of theory and practice.
The authors would like to thank the anonymous re-
viewers for their useful comments. This work is partially
supported from university project under the number
NUIT2020-001. This work also partially supported by
Guandong province special funds to foster the student’s
science and technology innovation under the number
PDJH2020B0689 (Climbing program funds).
[1] L. Zhang, Z. Fu, and Z. Juan, “Study on the popularizing
process of freight information exchange network based on
evolutionary game theory,” in 2007 International Conference on
Wireless Communications, Networking and Mobile Computing,
2007, pp. 6187–6190.
[2] R. Wei, “A critical issue of making out loading port and
unloading port in the bill of lading for marine transportation,”
in 2008 4th International Conference on Wireless Communica-
tions, Networking and Mobile Computing, 2008, pp. 1–4.
[3] S. Deng and F. Zhang, “Design of a knowledge-based e-crm
system: A case of freight forwarding industry,” in 2008 4th
International Conference on Wireless Communications, Net-
working and Mobile Computing, 2008, pp. 1–4.
[4] X. Yang and J. Luo, “Design and realization of management
information system for the freight forwarding agency business
of mini-enterprise,” in 2009 International Symposium on Com-
puter Network and Multimedia Technology, 2009, pp. 1–4.
[5] J. Zheng and M. Xu, “Computerization, an important way for
china’s international freight forwarders to improve competitive-
ness,” in 2010 International Conference on E-Business and E-
Government, 2010, pp. 3836–3839, in Chinese.
[6] X.-L. Hu and D. Liu, “Information resource integration of the
supply chain to promote freight forwarding industry,” in 2015
Third International Conference on Robot, Vision and Signal
Processing (RVSP), 2015, pp. 117–120.
[7] A. Jabbari and P. Kaminsky, “Blockchain and supply
chain management,” https://www.mhi.org/downloads/learning/
cicmhe/blockchain-and-supply-chain-management.pdf, January
2018.
[8] S. Jabbar, H. Lloyd, M. Hammoudeh, B. Adebisi, and U. Raza,
“Blockchain-enabled supply chain: analysis, challenges, and
future directions,” Multimedia Systems, Nov 2020. [Online].
Available: https://doi.org/10.1007/s00530-020-00687-0
[9] Y. Issaoui, A. Khiat, A. Bahnasse, and H. Ouajji, “Smart
logistics: Study of the application of blockchain technology,”
Procedia Computer Science, vol. 160, pp. 266–271, 2019, the
10th International Conference on Emerging Ubiquitous Systems
and Pervasive Networks (EUSPN-2019) / The 9th International
Conference on Current and Future Trends of Information
and Communication Technologies in Healthcare (ICTH-2019)
/ Affiliated Workshops. [Online]. Available: https://www.
sciencedirect.com/science/article/pii/S1877050919316825
[10] E. Tijan, S. Aksentijevi´c, K. Ivani´c, and M. Jardas, “Blockchain
technology implementation in logistics,” Sustainability, vol. 11,
no. 4, 2019. [Online]. Available: https://www.mdpi.com/
2071-1050/11/4/1185
[11] E. Irannezhad, “Is blockchain a solution for logistics and
freight transportation problems?” Transportation Research
Procedia, vol. 48, pp. 290–306, 2020, recent Advances and
Emerging Issues in Transport Research – An Editorial
Note for the Selected Proceedings of WCTR 2019
Mumbai. [Online]. Available: https://www.sciencedirect.com/
science/article/pii/S2352146520304397
[12] L. Koh, A. Dolgui, and J. Sarkis, “Blockchain in transport and
logistics – paradigms and transitions,” International Journal of
Production Research, vol. 58, no. 7, pp. 2054–2062, 2020.
[13] T. C. Poon and K. L. Choy, “Design of a logistics costs analyzer
to formulate distribution routes for freight forwarders,” in 2010
8th International Conference on Supply Chain Management and
Information, 2010, pp. 1–6.
5. Conclusion
Acknowledgments
References
WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS
DOI: 10.37394/23209.2022.19.19
Chenglian Liu, Sonia C-i Chen