Table 3 Warehouse receipt data layering.

From: A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms

Data layer

Included fields

Access permissions

Encryption strategy

Basic information

Variety, quantity, quality, specifications, origin,

cargo ID, weight, volume, etc.

Public

\

Moderately sensitive

information

Storage fees, insurance status, transportation methods,

estimated arrival time, etc.

Authorized

SM4-ECB symmetric encryption,

group keys

Highly sensitive information

Ownership information, transaction prices, transaction

party identities, transaction records, etc.

Restricted

SM4-ECB symmetric encryption,

independent keys for each field

Version control information

Version number, timestamp, data hash value, etc.

Public

\