Dataset Viewer
Auto-converted to Parquet Duplicate
paperId
stringlengths
40
40
text
stringlengths
51
184k
title
stringlengths
4
300
abstract
stringlengths
0
10k
year
stringclasses
49 values
publicationDate
stringlengths
0
19
url
stringlengths
78
78
venue
stringlengths
0
300
isOpenAccess
stringclasses
2 values
0000c2f981838f81c47759242ea123b6121401a9
## Memory Attacks on Device-Independent Quantum Cryptography Jonathan Barrett,[1, 2,][ ∗] Roger Colbeck,[3, 4,][ †] and Adrian Kent[5, 4,][ ‡] 1Department of Computer Science, University of Oxford, Wolfson Building, Parks Road, Oxford OX1 3QD, U.K. 2Department of Mathematics, Royal Holloway, University of London, Egham Hill, Egham, TW20 0EX, U.K. 3Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland. 4Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, ON N2L 2Y5, Canada. 5Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge, CB3 0WA, U.K. (Dated: 5[th] August 2013) Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defences include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defences as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each another (and no other party). Quantum cryptography aims to exploit the properties of quantum systems to ensure the security of various tasks. The best known example is quantum key distribution (QKD), which can enable two parties to share a secret random string and thus exchange messages secure against eavesdropping, and we mostly focus on this task for concreteness. While all classical key distribution protocols rely for their security on assumed limitations on an eavesdropper’s computational power, the advantage of quantum key distribution protocols (e.g. [1, 2]) is that they are provably secure against an arbitrarily powerful eavesdropper, even in the presence of realistic levels of losses and errors [3]. However, the security proofs require that quantum devices function according to particular specifications. Any deviation – which might arise from a malicious or incompetent manufacturer, or through sabotage or degradation – can introduce exploitable security flaws (see e.g. [4] for practical illustrations). The possibility of quantum devices with deliberately concealed flaws, introduced by an untrustworthy manufacturer or saboteur, is particularly concerning, since (i) it is easy to design quantum devices that appear to be following a secure protocol but are actually completely insecure[1], and (ii) there is no general technique for identifying all possible security loopholes in standard quan [∗Electronic address: jon.barrett@rhul.ac.uk](mailto:jon.barrett@rhul.ac.uk) [†Electronic address: colbeck@phys.ethz.ch](mailto:colbeck@phys.ethz.ch) [‡Electronic address: a.p.a.kent@damtp.cam.ac.uk](mailto:a.p.a.kent@damtp.cam.ac.uk) 1 In BB84 [1], for example, a malicious state creation device could be programmed to secretly send the basis used for the encoding in an additional degree of freedom. tum cryptography devices. This has led to much interest in device-independent quantum protocols, which aim to guarantee security on the fly by testing the device outputs [5–15]: no specification of their internal functionality is required. Known provably secure schemes for deviceindependent quantum key distribution are inefficient, as they require either independent isolated devices for each entangled pair to ensure device-independent security [6, 10–12, 16], or a large number of entangled pairs to generate a short key [6, 16, 17]. Finding an efficient secure device-independent quantum key distribution scheme using two (or few) devices has remained an open theoretical challenge. Nonetheless, in the absence of tight theoretical bounds on the scope for device-independent quantum cryptography, progress to date has encouraged optimism (e.g. [18]) about the prospects for device-independent QKD as a practical technology, as well as for device-independent quantum randomness expansion [13–15] and other applications of device-independent quantum cryptography (e.g. [19]). However, one key question has been generally neglected in work to date on device-independent quantum cryptography, namely what happens if and when devices are reused. Specifically, are device-reusing protocols composable – i.e. do individually secure protocols of this type remain secure when combined? It is clear that reuse of untrusted devices cannot be universally composable, i.e. such devices cannot be securely reused for completely general purposes (in particular, if they have memory, they must be kept secure after the protocol). However, for device-independent quantum cryptography to have significant practical value, one would hope that devices ----- can at least be reused for the same purpose. For example one would like to be able to implement a QKD protocol many times, perhaps with different parties each time, with a guarantee that all the generated keys can be securely used in an arbitrary environment so long as the devices are kept secure. We focus on this type of composability here. We describe a new type of attack that highlights pitfalls in producing protocols that are composable (in the above sense) with device-independent security for reusable devices, and show that for all known protocols such composability fails in the strong sense that purportedly secret data become completely insecure. The leaks do not exploit new side channels (which proficient users are assumed to block), but instead occur through the device choosing its outputs as part of a later protocol. To illustrate this, consider a device-independent scheme that allows two users (Alice and Bob) to generate and share a purportedly secure cryptographic key. A malicious manufacturer (Eve) can design devices so that they record and store all their inputs and outputs. A well designed device-independent protocol can prevent the devices from leaking information about the generated key during that protocol. However, when they are reused, the devices can make their outputs in later runs depend on the inputs and outputs of earlier runs, and, if the protocol requires Alice and Bob to publicly exchange at least some information about these later outputs (as all existing protocols do), this can leak information about the original key to Eve. Moreover, in many existing protocols, such leaks can be surreptitiously hidden in the noise, hence allowing the devices to operate indefinitely like hidden spies, apparently complying with security tests, and producing only data in the form the protocols require, but nonetheless actually eventually leaking all the purportedly secure data. We stress that our results certainly do not imply that quantum key distribution per se is insecure or impractical. In particular, our attacks do not apply to standard QKD protocols in which the devices’ properties are fully trusted, nor if the devices are trusted to be memoryless (but otherwise untrusted), nor necessarily to protocols relying on some other type of partially trusted devices. Our target is the possibility of (full) device-independent quantum cryptographic security, applicable to users who purchase devices from a potentially sophisticated adversarial supplier and rely on no assumption about the devices’ internal workings. The attacks we present raise new issues of composability and point towards the need for new protocol designs. We discuss some countermeasures to our attacks that appear effective in the restricted but relevant scenario where two users only ever use their devices for QKD exchanges with one another, and propose a new type of protocol that aims to achieve security in this scenario while allowing device reuse. Even with these countermeasures, however, we show that security of a key generated with Bob can be compromised if Alice uses the same device for key generation with an additional party. This appears to be a generic problem against which we see no complete defence. Although we focus on device-independent QKD for most of this work, our attacks also apply to other deviceindependent quantum cryptographic tasks. The case of randomness expansion is detailed in Appendix E. Cryptographic scenario.—We use the standard cryptographic scenario for key distribution between Alice and Bob, each of whom has a secure laboratory. These laboratories may be partitioned into secure sub-laboratories, and we assume Alice and Bob can prevent communication between their sub-laboratories as well as between their labs and the outside world, except as authorized by the protocol. The setup of these laboratories is as follows. Each party has a trusted private random string, a trusted classical computer and access to two channels connecting them. The first channel is an insecure quantum channel. Any data sent down this can be intercepted and modified by Eve, who is assumed to know the protocol. The second is an authenticated classical channel which Eve can listen to but cannot impersonate; in efficient QKD protocols this is typically implemented by using some key bits to authenticate communications over a public channel. Each party also uses a sub-laboratory to isolate each of the untrusted devices being used for today’s protocol. They can connect them to the insecure quantum channel, as desired, and this connection can be closed thereafter. They can also interact with each device classically, supplying inputs (chosen using the trusted private string) and receiving outputs, without any other information flowing into or out of the secure sub-laboratory. As mentioned before, existing device-independent QKD protocols that have been proven unconditionally secure [6, 11, 12] require separate devices for each measurement performed by Alice and Bob with no possibility of signalling between these devices[2], or are inefficient [17] (in terms of the amount of key per entangled pair). For practical device-independent QKD, we would like to remove both of these disadvantages and have an efficient scheme needing a small number of devices. Since the protocols in [11, 12] can tolerate reasonable levels of noise and are reasonably efficient, we look first at implementations of protocols taking the form of those in [11, 12], except that Alice and Bob use one measurement device each, i.e., Alice (Bob) uses the same device to perform each of her (his) measurements. We call these two-device protocols (Bob also has a separate isolated source device: see below). The memory of a device can then act as a signal from earlier to later measurements, hence the security proofs of [11, 12] do not apply (see also [20] where a different two-device setup is dis 2 Within the scenario described above, this could be achieved by placing each device in its own sub-laboratory. ----- 1. Entangled quantum states used in the protocol are generated by a device Bob holds (which is separate and kept isolated from his measurement device) and then shared over an insecure quantum channel with Alice’s device. Bob feeds his half of each state to his measurement device. Once the states are received, the quantum channel is closed. 2. Alice and Bob each pick a random input Ai and Bi to their device, ensuring they receive an output bit (Xi and Yi respectively) before making the next input (so that the i-th output cannot depend on future inputs). They repeat this M times. 3. Either Alice or Bob (or both) publicly announces their measurement choices, and the relevant party checks that they had a sufficient number of suitable input combinations for the protocol. If not, they abort. 4. (Sifting.) Some output pairs may be discarded according to some public protocol. 5. (Parameter estimation.) Alice randomly and independently decides whether to announce each remaining bit to Bob, doing so with probability µ (where Mµ ≫ 1). Bob uses the communicated bits and his corresponding outputs to compute some test function, and aborts if it lies outside a desired range. (For example, Bob might compute the CHSH value [21] of the announced data, and abort if it is below 2.5.) 6. (Error correction.) Alice and Bob perform error correction using public discussion, in order to (with high probability) generate identical strings. Eve learns the error correction function Alice applies to her string. 7. (Privacy amplification.) Alice and Bob publicly perform privacy amplification [22], producing a shorter shared string about which Eve has virtually no information. Eve similarly learns the privacy amplification function they apply to their error-corrected strings. TABLE I: Generic structure of the protocols we consider. Although this structure is potentially restrictive, most protocols to date are of this form (we discuss modifications later). Note that we do not need to specify the precise subprotocols used for error correction or privacy amplification. For an additional remark, see Part I of the Appendix cussed). It is an open question whether a secure key can be efficiently generated by a protocol of this type in this scenario. Here we demonstrate that, even if a key can be securely generated, repeat implementations of the protocol using the same devices can render an earlier generated key insecure. Attacks on two-device protocols.—Consider a QKD protocol with the standard structure shown in Table I. We imagine a scenario in which a protocol of this type is run on day 1, generating a secure key for Alice and Bob, while informing Eve of the functions used by Alice for error correction and privacy amplification (for simplicity we assume the protocol has no sifting procedure (Step 4)). The protocol is then rerun on day 2, to generate a second key, using the same devices. Eve can instruct the devices to proceed as follows. On day 1, they follow the protocol honestly. However, they keep hidden records of all the raw bits they generate during the protocol. At the end of day 1, Eve knows the error correction and privacy amplification functions used by Alice and Bob to generate the secure key. On day 2, since Eve has access to the insecure quantum channel over which the new quantum states are distributed, she can surreptitiously modulate these quantum states to carry new classical instructions to the device in Alice’s lab, for example using additional degrees of freedom in the states. These instructions tell the device the error correction and privacy amplification functions used on day 1, allowing it to compute the secret key generated on day 1. They also tell the device to deviate from the honest protocol for randomly selected inputs, by producing as outputs specified bits from this secret key. (For example, “for input 17, give day 1’s key bit 5 as output”.) If any of these selected outputs are among those announced in Step 5, Eve learns the corresponding bits of day 1’s secret key. We call this type of attack, in which Eve attempts to gain information from the classical messages sent in Step 5, a parameter estimation attack. If she follows this cheating strategy for Nµ[−][1] < M input bits, Eve is likely to learn roughly N bits of day 1’s secret key. Moreover, only the roughly N output pairs from this set that are publicly compared give Alice and Bob statistical information about Eve’s cheating. Alice and Bob cannot a priori identify these cheating output pairs among the ≈ µM they compare. Thus, if the tolerable noise level is comparable to Nµ[−][1]M [−][1], Eve can (with high probability) mask her cheating as noise. (Note that in unconditional security proofs it is generally assumed that eavesdropping is the cause of all noise. Even if in practice Eve cannot reduce the noise to zero, she can supply less noisy components than she claims and use the extra tolerable noise to cheat). In addition, Alice and Bob’s devices each separately have the power to cause the protocol to abort on any day of their choice. Thus – if she is willing to wait long enough – Eve can program them to communicate some or all information about their day 1 key, for instance by encoding the relevant bits as a binary integer N = b1 . . . bm and choosing to abort on day (N + 2)[3]. We call this type of attack an abort attack. Note that it cannot be detected until it is too late. As mentioned above, some well known protocols use many independent and isolated measurement devices. These protocols are also vulnerable to memory attacks, as explained in Appendix D. 3 In practice, Eve might infer a day (N +2) abort from the fact that Alice and Bob have no secret key available on day (N +2), which in many scenarios might detectably affect their behaviour then or subsequently. Note too that she might alternatively program the devices to abort on every day from (N + 2) onwards if this made N more easily inferable in practice. ----- Modified protocols.—We now discuss ways in which these attacks can be partly defended against. Countermeasure 1.—All quantum data and all public communication of output data in the protocol come from one party, say Bob. Thus, the entangled states used in the protocol are generated by a separate isolated device held by Bob (as in the protocol in Table 1) and Bob (rather than Alice) sends selected output data over a public channel in Step 5. If Bob’s device is forever kept isolated from incoming communication, Eve has no way of sending it instructions to calculate and leak secret key bits from day 1 (or any later day). Existing protocols modified in this way are still insecure if reused, however. For example, in a modified parameter estimation attack, Eve can pre-program Bob’s device to leak raw key data from day 1 via output data on subsequent days, at a low enough rate (compared to the background noise level) that this cheating is unlikely to be detected. If the actual noise level is lower than the level tolerated in the protocol, and Eve knows both (a possibility Alice and Bob must allow for), she can thereby eventually obtain all Bob’s raw key data from day 1, and hence the secret key. In addition, Eve can still communicate with Alice’s device, and Alice needs to be able to make some public communication to Bob, if only to abort the protocol. Eve can thus obtain secret key bits from day 1 on a later day using an abort attack. Countermeasure 2. [23] —Encrypt the parameter estimation information sent in Step 5 with some initial preshared seed randomness. Provided the seed required is small compared to the size of final string generated (which is the case in efficient QKD protocols [11, 12]), the protocol then performs key expansion[4]. Furthermore, even if they have insufficient initial shared key to encrypt the parameter estimation information, Alice and Bob could communicate the parameter estimation information unencrypted on day 1, but encrypt it on subsequent days using generated key. Note that this countermeasure is not effective against abort attacks, which can now be used to convey all or part of their day 1 raw key. This type of attack seems unavoidable in any standard cryptographic model requiring composability and allowing arbitrarily many device reuses if either Alice or Bob has only a single measurement device. This countermeasure is also not effective in general cryptographic environments involving communication with multiple users who may not all be trustworthy. Suppose that Alice wants to share key with Bob on day 1, but with Charlie on day 2. If Charlie becomes corrupted by Eve, then, for example by hiding data in 4 QKD is often referred to as quantum key expansion in any case, taking into account that a common method of authenticating the classical channel uses pre-shared randomness. the parameter estimation, Eve can learn about day 1’s key (we call this an impostor attack ). This attack applies in many scenarios in which users might wish to use device-independent QKD. For example, suppose Alice is a merchant and Bob is a customer who needs to communicate his credit card number to Alice via QKD to complete the sale. The next day, Eve can pose as a customer, carry out her own QKD exchange with Alice, and extract information about Bob’s card number without being detected. Countermeasure 3.—Alternative protocols using additional measurement devices. Suppose Alice and Bob each have m measurement devices, for some small integer m ≥ 2. They perform Steps 1–6 of a protocol that takes the form given in Table I but with Countermeasures 1 and 2 applied. They repeat these steps for each of their devices in turn, ensuring no communication between any of them (i.e., they place each in its own sub-laboratory). This yields m error-corrected strings. Alice and Bob concatenate their strings before performing privacy amplification as in Step 7. However, they further shorten the final string such that it would (with near certainty) remain secure if one of the m error-corrected strings were to become known to Eve through an abort attack. (See Table 2, and Appendix C for more details). This countermeasure doesn’t avoid impostor attacks. Instead, the idea is to prevent useful abort attacks (as well as parameter estimation attacks due to Countermeasure 2), and hence give us a secure and composable protocol, provided the keys produced on successive days are always between the same two users. The information each device has about day 1’s key is limited to the raw key it produced. Thus, if each device is programmed to abort on a particular day that encodes their day 1 raw key, after an abort, Eve knows one of the devices’ raw keys and has some information on the others (since she can exclude certain possibilities based on the lack of abort by those devices so far). After an abort, Alice and Bob should cease to use any of their devices unless and until such time that they no longer require that their keys remain secret. Intuitively, provided the set of m keys was sufficiently shortened in the privacy amplification step, Eve has essentially no information about the day 1 secret key, which thus (we conjecture) remains secure. Countermeasure 4.—Alice and Bob share a small initial secret key and use part of it to choose the privacy amplification function in Step 7 of the protocol, which may then never become known to Eve. Even in this case, Eve can pre-program Bob’s measurement device to leak raw data from day 1 on subsequent days, either via a parameter estimation attack or via an abort attack. While Eve cannot obtain bits of the secret key so directly in this case, provided the protocol is composed sufficiently many times, she can eventually obtain all the raw key. This means that Alice and Bob’s residual security ultimately derives only from the initial shared secret key: their QKD protocol produces no extra permanently secure data. ----- In summary, we have shown how a malicious manufacturer who wishes to mislead users or obtain data from them can equip devices with a memory and use it in programming them. The full scope of this threat seems to have been overlooked in the literature on deviceindependent quantum cryptography to date. A task is potentially vulnerable to our attacks if it involves secret data generated by devices and if Eve can learn some function of the device outputs in a subsequent protocol. Since even causing a protocol to abort communicates some information to Eve, the class of tasks potentially affected is large indeed. In particular, for one of the most important applications, QKD, none of the protocols so far proposed remain composably secure in the case that the devices are supplied by a malicious adversary. One can think of the problems our attacks raise as a new issue of cryptographic composability. One way of thinking of standard composability is that a secure output from a protocol must still have all the properties of an ideal secure output when combined with other outputs from the same or other protocols. The deviceindependent key distribution protocols we have examined fail this test because the reuse of devices can cause later outputs to depend on earlier ones. In a sense, the underlying problem is that the usage of devices is not composably secure. This applies too, of course, for devices used in different protocols: devices used for secure randomness expansion cannot then securely be used for key distribution without potentially compromising the generated randomness, for example. It is worth reiterating that our attacks do not apply against protocols where the devices are trusted to be memoryless. Indeed, there are schemes that are composably secure for memoryless devices [11, 12]. We also stress that our attacks do not apply to all protocols for device-independent quantum tasks related to cryptography. For example, even devices with memories cannot mimic nonlocal correlations in the absence of shared entanglement [24, 25]. In addition, in applications that require only short-lived secrets, devices may be reused once such secrets are no longer required. Partially secure device-independent protocols for bit commitment and coin tossing [19], in which the committer supplies devices to the recipient, are also immune from our attacks, so long as the only data entering the devices come from the committer. Note too that, in practice the number of uses required to apply the attacks may be very large, for example, in the case of some of the abort attacks we described. One can imagine a scenario in which Alice and Bob want to carry out device-independent QKD no more than n times for some fixed number n, each is confident in the other’s trustworthiness throughout, the devices are used for no other purpose and are destroyed after n rounds, and key generation is suspended and the devices destroyed if a single abort occurs. If the only relevant information con veyed to Eve is that an abort occurs on one of the n days, she can only learn at most log n bits of information about the raw key via an abort attack. Hence one idea is that, using suitable additional privacy amplification, Alice and Bob could produce a device-independent protocol using two measurement devices that is provably secure when restricted to no more than n bilateral uses. It would be interesting to analyse this possibility, which, along with the protocol presented in Table 2, leads us to hold out the hope of useful security for fully device-independent QKD, albeit in restricted scenarios. We have also discussed some possible defences and countermeasures against our attacks. A theoretically simple one is to dispose of – i.e. securely destroy or isolate – untrusted devices after a single use (see Appendix B). While this would restore universal composability, it is clearly costly and would severely limit the practicality of device-independent quantum cryptography. Another interesting possibility is to design protocols for composable device-independent QKD guaranteed secure in more restricted scenarios. However, the impostor attacks described above appear to exclude the possibility of composably secure device-independent QKD when the devices are used to exchange key with several parties. Many interesting questions remain open. Nonetheless, the attacks we have described merit a serious reappraisal of current protocol designs and, in our view, of the practical scope of universally composable quantum cryptography using completely untrusted devices. Added Remark: Since the first version of this paper, there has been new work in this area that, in part, explores countermeasure 2 in more detail [26]. In addition, two new works on device-independent QKD with only two devices have appeared [27, 28]. Note that these do not evade the attacks we present, but apply to the scenario where used devices are discarded. Acknowledgements.—We thank Anthony Leverrier and Gonzalo de la Torre for [23], Llu´ıs Masanes, Serge Massar and Stefano Pironio for helpful comments. JB was supported by the EPSRC, and the CHIST-ERA DIQIP project. RC acknowledges support from the Swiss National Science Foundation (grants PP00P2-128455 and 20CH21-138799) and the National Centre of Competence in Research ‘Quantum Science and Technology’. AK was partially supported by a Leverhulme Research Fellowship, a grant from the John Templeton Foundation, and the EU Quantum Computer Science project (contract 255961). This research is supported in part by Perimeter Institute for Theoretical Physics. Research at Perimeter Institute is supported by the Government of Canada through Industry Canada and by the Province of Ontario through the Ministry of Research and Innovation. ----- [1] Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175–179. IEEE (New York, 1984). [2] Ekert, A. K. Quantum cryptography based on Bell’s theorem. Physical Review Letters 67, 661–663 (1991). [3] Renner, R. Security of Quantum Key Distribution. Ph.D. thesis, Swiss Federal Institute of Technology, Zurich (2005). Also available as quant-ph/0512258. [4] Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Communications 2, 349 (2011). [5] Mayers, D. & Yao, A. Quantum cryptography with imperfect apparatus. In Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS98), 503–509 (IEEE Computer Society, Los Alamitos, CA, USA, 1998). [6] Barrett, J., Hardy, L. & Kent, A. No signalling and quantum key distribution. Physical Review Letters 95, 010503 (2005). [7] Acin, A., Gisin, N. & Masanes, L. From Bell’s theorem to secure quantum key distribution. Physical Review Letters 97, 120405 (2006). [8] Scarani, V. et al. Secrecy extraction from no-signaling correlations. Physical Review A 74, 042339 (2006). [9] Acin, A. et al. Device-independent security of quantum cryptography against collective attacks. Physical Review Letters 98, 230501 (2007). [10] Masanes, L., Renner, R., Christandl, M., Winter, A. & Barrett, J. Unconditional security of key distribution from causality constraints. e-print quant-ph/0606049v4 (2009). [11] H¨anggi, E. & Renner, R. Device-independent quantum key distribution with commuting measurements. e-print [arXiv:1009.1833 (2010).](arXiv:1009.1833) [12] Masanes, L., Pironio, S. & Ac´ın, A. Secure deviceindependent quantum key distribution with causally independent measurement devices. Nature Communications 2, 238 (2011). [13] Colbeck, R. Quantum and Relativistic Protocols For Secure Multi-Party Computation. Ph.D. thesis, University [of Cambridge (2007). Also available as arXiv:0911.3814.](arXiv:0911.3814) [14] Pironio, S. et al. Random numbers certified by Bell’s theorem. Nature 464, 1021–1024 (2010). [15] Colbeck, R. & Kent, A. Private randomness expansion with untrusted devices. Journal of Physics A 44, 095305 (2011). [16] Barrett, J., Kent, A. & Pironio, S. Maximally non-local and monogamous quantum correlations. Physical Review Letters 97, 170409 (2006). [17] Barrett, J., Colbeck, R. & Kent, A. Unconditionally secure device-independent quantum key distribution with [only two devices. e-print arXiv:1209.0435 (2012).](arXiv:1209.0435) [18] Ekert, A. Less reality, more security. Physics World (September 2009). [19] Silman, J. et al. Fully distrustful quantum bit commitment and coin flipping. Physical Review Letters 106, 220501 (2011). [20] H¨anggi, E., Renner, R. & Wolf, S. The impossibility of non-signalling privacy amplification. e-print [arXiv:0906.4760 (2009).](arXiv:0906.4760) [21] Clauser, J. F., Horne, M. A., Shimony, A. & Holt, R. A. Proposed experiment to test local hidden-variable theories. Physical Review Letters 23, 880–884 (1969). [22] Bennett, C. H., Brassard, G. & Robert, J.-M. Privacy amplification by public discussion. SIAM Journal on Computing 17, 210–229 (1988). [23] de la Torre, G. & Leverrier, A. (2012). Personal communication. [24] Barrett, J., Collins, D., Hardy, L., Kent, A. & Popescu, S. Quantum nonlocality, Bell inequalities, and the memory loophole. Physical Review A 66, 042111 (2002). [25] Gill, R. D. Accardi contra Bell (cum mundi): The impossible coupling. In Moore, M., Froda, S. & L´eger, C. (eds.) Mathematical Statistics and Applications: Festschrift for Constance van Eeden, vol. 42 of IMS Lecture Notes – Monograph Series, 133–154 (2003). [26] McKague, M. & Sheridan, L. Reusing devices with memory in device independent quantum key distribution. e[print arXiv:1209.4696 (2012).](arXiv:1209.4696) [27] Reichardt, B. W., Unger, F. & Vazirani, U. Classical command of quantum systems via rigidity of CHSH [games. e-print arXiv:1209.0449 (2012).](arXiv:1209.0449) [28] Vazirani, U. & Vidick, T. Fully device independent quan[tum key distribution. e-print arXiv:1210.1810 (2012).](arXiv:1210.1810) [29] Carter, J. L. & Wegman, M. N. Universal classes of hash functions. Journal of Computer and System Sciences 18, 143–154 (1979). [30] Wegman, M. N. & Carter, J. L. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences 22, 265–279 (1981). [31] Tomamichel, M., Renner, R., Schaffner, C. & Smith, A. Leftover hashing against quantum side information. In Proceedings of the 2010 IEEE Symposium on Information Theory (ISIT10), 2703–2707 (2010). [32] Trevisan, L. Extractors and pseudorandom generators. Journal of the ACM 48, 860–879 (2001). [33] De, A., Portmann, C., Vidick, T. & Renner, R. Trevisan’s extractor in the presence of quantum side information. e[print arXiv:0912.5514 (2009).](arXiv:0912.5514) [34] Tomamichel, M., Colbeck, R. & Renner, R. Duality between smooth min- and max-entropies. IEEE Transactions on information theory 56, 4674–4681 (2010). [35] Fehr, S., Gelles, R. & Schaffner, C. Security and composability of randomness expansion from Bell inequalities. [e-print arXiv:1111.6052 (2011).](arXiv:1111.6052) [36] Vazirani, U. & Vidick, T. Certifiable quantum dice or, testable exponential randomness expansion. e-print [arXiv:1111.6054 (2011).](arXiv:1111.6054) [37] Pironio, S. & Massar, S. Device-independent randomness expansion secure against quantum adversaries. e-print [arXiv:1111.6056 (2011).](arXiv:1111.6056) Appendix A: Separation of sources and measurement devices We add here one important comment about the general structure of the generic protocol given in Table 1 of the main text. There it was crucial that in Step 1, in the ----- case where Bob (rather than Eve) supplies the states, he does so using a device that is isolated from his measurement device. If, on the other hand, Bob had only a single device that both supplies states and performs measurements, then his device can hide information about day 1’s raw key in the states he sends on day 2. (This can be done using states of the form specified in the protocol, masking the errors as noise as above. Alternatively, the data could be encoded in the timings of the signals or in quantum degrees of freedom not used in the protocol.) Appendix B: Toxic device disposal As noted in the main text, standard cryptographic models postulate that the parties can create secure laboratories, within which all operations are shielded from eavesdropping. Device-independent quantum cryptographic models also necessarily assume that devices within these laboratories cannot signal to the outside – otherwise security is clearly impossible. Multi-device protocols assume that the laboratories can be divided into effectively isolated sub-laboratories, and that devices in separate sub-laboratories cannot communicate. In other words, Alice and Bob must be able to build arbitrary configurations of screening walls, which prevent communication among Eve and any of her devices, and allow only communications specified by Alice and Bob. Given this, there is no problem in principle in defining protocols which prescribe that devices must be permanently isolated: the devices simply need to be left indefinitely in a screened sub-laboratory. While this could be detached from the main working laboratory, it must be protected indefinitely: screening wall material and secure space thus become consumed resources. And indeed in some situations, it may be more efficient to isolate devices, rather than securely destroy them, since devices can be reused once the secrets they know have become public by other means. For example, one may wish to securely communicate the result of an election before announcing it, but once it is public, the devices used for this secure communication could be safely reused. The alternative, securely destroying devices and then eliminating them from the laboratory, preserves laboratory space but raises new security issues: consider, for example, the problems in disposing of a device programmed to change its chemical composition depending on its output bit. That said, no doubt there are pretty secure ways of destroying devices, and no doubt devices could be securely isolated for long periods. However, the costs and problems involved, together with the costs of renewing devices, make us query whether these are really viable paths for practical device-independent quantum cryptography. Appendix C: Privacy Amplification Here we briefly outline the important features of privacy amplification, which is a key step in the protocol. As explained in the main text, the idea is to compress the string such that (with high probability) an eavesdropper’s knowledge is reduced to nearly zero. This usually works as follows. Suppose Alice and Bob share some random string, X, which may be correlated with a quantum system, E, held by the eavesdropper. Alice also holds some private randomness, R. The state held by Alice and Eve then takes the form � ρXRE = PX (x)PR(r)|x⟩⟨x|X ⊗|r⟩⟨r|R ⊗ ρ[x]E[,] x,r where {ρ[x]E[}][x][ are normalized density operators, and] PR(r) = 1/|R|. The randomness R is used to choose a function fR ∈F, where F is some suitably chosen set, to apply to X such that, even if she learns R, the eavesdropper’s knowledge about the final string is close to zero. If we call the final string S = fR(X), then Eve has no knowledge about it if the final state takes the form τS ⊗ ρRE, where τS is maximally mixed on S. However, we cannot usually attain such a state, and instead measure the success of a protocol by its variation from this ideal, measured using the trace distance, D. Denoting the final state (after applying the function) by ρSRE, we are interested in D(ρSRE, τS ⊗ ρRE). Fortunately, several sets of function are known for which the above distance can be made arbitrarily small. Two common constructions are those based on twouniversal hash functions [3, 29–31] and Trevisan’s extractor [32, 33]. The precise details of these is not very important for the present work (we refer the interested reader to the references), nor is it important which we choose. However, it is worth noting that for two-universal hash functions, the size of the seed needs to be roughly equal to that of the final string, while for Trevisan’s extractor, this can be reduced to roughly the logarithm of the length of the initial string (in the latter case, this may allow it to be sent privately, if desired). For both, the amount that the string should be compressed is quantified by the smooth conditional minentropy, which we now define. For a state ρAB, the nonsmooth conditional min-entropy is defined as Hmin(A|B)ρ := max σB [sup][{][λ][ ∈] [R][ : 2][−][λ][1][1][A][ ⊗] [σ][B][ ≥] [ρ][AB][}][,] in terms of which the smooth min entropy is given by Hmin[ε] [(][A][|][B][)][ρ][ := max]ρ¯AB [H][min][(][A][|][B][)][ρ][¯][.] The maximization over ¯ρ is over a set of states that are close to ρAB according to some distance measure (see, for example, [34] for a discussion). The significance for privacy amplification can be seen as follows. In [3], it is shown that if f is chosen randomly from a set of two-universal hash functions, and applied ----- 1. Entangled quantum states used in the protocol are generated by a device Bob holds (which is separate and kept isolated from his measurement devices) and then shared over an insecure quantum channel with Alice’s first device. Bob feeds his half of each state to his first measurement device. Once the states are received, the quantum channel is closed. 2. Alice and Bob each pick a random input Ai and Bi to their first device, ensuring they receive an output bit (Xi and Yi respectively) before making the next input (so that the i-th output cannot depend on future inputs). They repeat this M times. 3. Bob publicly announces his measurement choices, and Alice checks that for a sufficient number of suitable input combinations for the protocol. If not, Alice aborts. 4. (Sifting.) Some output pairs may be discarded according to some protocol. 5. (Parameter estimation.) Alice and Bob use their preshared key to randomly select some output pairs (they select only a small fraction, hence the amount of key required for this is small). For each of the selected pairs, Bob encrypts his output and sends it to Alice. Alice uses the communicated bits and her corresponding outputs to compute some test function, and aborts if it lies outside a desired range. 6. (Error correction.) Alice and Bob perform error correction using public discussion, in order to (with high probability) generate identical strings. Eve learns the error correction function Alice applies to her string. 7. Alice and Bob repeat Steps 1–6 for each of their m devices (ensuring the devices cannot communicate throughout) 8. (Privacy amplification.) Alice and Bob concatenate their m strings and publicly perform privacy amplification [22], producing a shorter shared string about which Eve has virtually no information. In this step, the size of their final string is chosen such that (with high probability) it will remain secure even if one of the raw strings or its error corrected version becomes known. TABLE 2: Structure of the protocol from the main text with modifications as in Countermeasure 3. For this protocol Alice and Bob each have m ≥ 2 measurement devices, and Bob has one device for creating states. They are all kept isolated from one another. to the raw string X, as above, then for |S| = 2[t] and any ε ≥ 0, D(ρSRE, τS ⊗ ρRE) ≤ ε + [1] 2 [(][H]min[ε] [(][X][|][E][)][−][t][)]. 2 [2][−] [1] (An analogous statement can be made for Trevisan’s extractor [33].) Thus, if Alice compresses her string to length t = Hmin[ε] [(][X][|][E][)][ −] [ℓ][, then the final state after ap-] plying the hash function has distance ε + [1]2 [2][−][ℓ/][2][ to a] state about which Eve has no knowledge. Turning to the QKD protocol in Table 1 of the main text, in the case of hashing the privacy amplification procedure consists of Alice selecting t depending on the test function computed in the parameter estimation step. She then uses local randomness to choose a hash function to apply to her string, and announces this to Bob, who applies the same function to his string (since we have already performed error correction, this string should be identical to Alice’s). The idea is that, if t is chosen appropriately, it is virtually impossible that the parameter estimation tests pass and the final state at the end of the protocol is not close to one for which Eve has no knowledge about the final string. In the modified protocol in Table 2, we expect each pair of devices to contribute roughly the same amount of smooth min entropy to the concatenated string. Thus, since there are m devices, in order to tolerate the potential revelation of one of the error-corrected strings through an abort attack, Alice should choose t to be roughly (m − 1)/m shorter than she would otherwise. Appendix D: Memory attacks on multi-device QKD protocols To illustrate further the generality of our attacks, we now turn to multi-device protocols, and show how to break iterated versions of two well known protocols. Attacks on compositions of the BHK protocol The Barrett-Hardy-Kent (BHK) protocol [6] requires Alice and Bob to share MN [2] pairs of systems (where M and N are both large with M ≪ N ), in such a way that no measurements on any subset can effectively signal to the others. In a device-independent scenario, we can think of these as black box devices supplied by Eve, containing states also supplied by Eve. Each device is isolated within its own sub-laboratory of Alice’s and Bob’s, so that Alice and Bob have MN [2] secure sublaboratories each. The devices accept integer inputs in the range {0, . . ., N − 1} and produce integer outputs in the range {0, 1}. Alice and Bob choose random independent inputs, which they make public after obtaining all the outputs. They also publicly compare all their outputs except for those corresponding to one pair randomly chosen from among those in which the inputs differ by ±1 or 0 modulo N . If the publicly declared outputs agree with quantum statistics for specified measurement basis choices (corresponding to the inputs) on a singlet state, then they accept the protocol as secure, and take the final undeclared outputs (which are almost certainly anticorrelated) to define their shared secret bit. The BHK protocol produces (with high probability) precisely one secret bit: evidently, it is extremely inefficient in terms of the number of devices required. It also requires essentially noise-free channels and errorfree measurements. Despite these impracticalities it il ----- lustrates our theoretical point well. Suppose that Alice and Bob successfully complete a run of the BHK protocol and then (unauthorised by BHK) decide to use the same 2MN [2] devices to generate a second secret bit, and ask Eve to supply a second batch of states to allow them to do this. Eve — aware in advance that the devices may be reused — can design them to function as follows. In the first run of the protocol, she supplies a singlet pair to each pair of devices and the devices function honestly, carrying out the appropriate quantum measurements on their singlets and reporting the outcomes as their outputs. However, they also store in memory their inputs and outputs. In the second run, Eve supplies a fresh batch of singlet pairs. However, she also supplies a hidden classical signal identifying the particular pair of devices that generated the first secret bit. (This signal need go to just one of this pair of devices, and no others.) On the second run, the identified device produces as output the same output that it produced on the first run (i.e. the secret bit generated, up to a sign convention known to Eve). All other devices function honestly on the second run. With probability [MN]MN[ 2][−][2][, the output from the cheating][1] device on the second run will be made public, thus revealing the first secret bit to Eve. Moreover, with probability 1 − 23N [+][ O][(][N][ −][2][), this cheating will not be detected by] Alice and Bob’s tests, so that Eve learns the first secret bit without her cheating even being noticed. There are defences against this specific attack. First, the BHK protocol [6] can be modified so that only outputs corresponding to inputs differing by ±1 or 0 are publicly shared.[5] While this causes Eve to wait many rounds for the secret bit to be leaked, and increases the risk her cheating will be detected, it leaves the iterated protocol insecure. Second, Alice and Bob could securely destroy or isolate the devices producing the secret key bit outputs, and reuse all their other devices in a second implementation. Since only the devices generating the secret key bit have information about it, this prevents it from being later leaked. While effective, this last defence really reflects the inefficiency of the BHK protocol: to illustrate this, we turn next to a more efficient multi-device protocol. Attacks on compositions of the HR protocol H¨anggi and Renner (HR) [11] consider a multi-device QKD protocol related to the Ekert [2] protocol, in which Alice and Bob randomly and independently choose one of 5 As originally presented, the BHK protocol requires public exchange of all outputs except those defining the secret key bit. This is unnecessary, and makes iterated implementations much more vulnerable to the attacks discussed here. two or three inputs respectively for each of their devices. If the devices are functioning honestly, these correspond to measurements of a shared singlet in the bases U0, U1 (Alice) and V0, V1, V2 (Bob), defined by the following vectors and their orthogonal complements U1 ↔|0⟩, V0 ↔ cos(π/8)|0⟩ + sin(π/8)|1⟩, U0, V2 ↔ cos(π/4)|0⟩ + sin(π/4)|1⟩, V1 ↔ cos(3π/8)|0⟩ + sin(3π/8)|1⟩ . The raw key on any given run is defined by the ≈ 1/6 of the cases in which U0 and V2 are chosen. Information reconciliation and privacy amplification proceed according to protocols of the type described in the main text (in which the functions used are released publicly). Evidently, our attacks apply here too if (unauthorised by HR) the devices are reused to generate further secret keys. Eve can identify the devices that generate the raw key on day 1, and request them to release their key as cheating outputs on later days, gradually enough that the cheating will be lost in the noise. Since the information reconciliation and privacy amplification functions were made public by Alice, she can then obtain the secret key. Even if she is unable to communicate directly with the devices for a long time (because they were pre-installed with a very large reservoir of singlets), she can program all devices to gradually release their day 1 outputs over subsequent days, and so can still deduce the raw and secret keys. Alice and Bob could counter these attacks by securely destroying or isolating all the devices that generated raw key on day 1 — but this costs them 1/6 of their devices, and they have to apply this strategy each time they generate a key, leaving (5/6)[N] of the devices after N runs, and leaving them able to generate shorter and shorter keys. As the length of secure key generated scales by (5/6)[N] (or worse, allowing for fluctuations due to noise) on each run, the total secret key generated is bounded by ≈ 6M, where M is the secret key length generated on day 1. Note that, as in the case of the iterated BHK protocol, all devices that generate secret key become toxic and cannot be reused. While the relative efficiency of the HR protocol ensures a (much) faster secret key rate, it also requires an equally fast device depletion rate. This example shows that our attacks pose a generic problem for device-independent QKD protocols of the types considered to date. Appendix E: Device-independent randomness expansion protocols: attacks and defences Device-independent quantum randomness expansion (DVI QRE) protocols were introduced by two of us [13, 15], developed further by [14, 35–37], and there now exist schemes with unconditional security proofs [36]. The ----- cryptographic scenario here is slightly different from that of key distribution in that there is only one honest party, Alice. Alice’s aim is to expand an initial secret random string to a longer one that is guaranteed secret from an eavesdropper, Eve, even if the quantum devices and states used are supplied by Eve. The essential idea is that seed randomness can be used to carry out nonlocality tests on the devices and states, within one or more secure laboratories, in a way that guarantees (with numerical bounds) that the outcomes generate a partially secret and random string. Privacy amplification can then be used to generate an essentially fully secret random string, which (provided the tests are passed) is significantly longer than the initial seed. There are already known pitfalls in designing such protocols. For example, although one might think that carrying out a protocol in a single secure laboratory guarantees that the initially secure seed string remains secure, and so guarantees randomness expansion if any new secret random data is generated, this is not the case [15]. Eve’s devices may be programmed to produce outputs depending on the random seed in such a way that the length of the final secret random string depends on the initial seed. Protocols with this vulnerability are not composably secure. (To see this can be a practical problem, note that Eve may infer the length of the generated secret random string from its use.) A corollary of our results is that, if one wants to reuse the devices to generate further randomness, it is crucial to carry out DVI QRE protocols with devices permanently held within a single secure laboratory, avoiding any public communication of device output data at any stage. It is crucial too that the devices themselves are securely isolated from classical communications and computations within the laboratory, to prevent them from learning details of the reconciliation and privacy amplification. Even under these stringent conditions, our attacks still apply in principle. For example, consider a noise-tolerant protocol that produces a secret random output string of variable length, depending on the values of test functions of the device outputs (the analogue of QKD parameter estimation for QRE) that measure how far the device outputs deviate from ideal honest outputs. This might seem natural for any single run, since – if the devices are never reused – the length of the provably secret random string that can be generated does indeed depend on the value of a suitable test function. However, iterating such a protocol allows the devices to leak information about (at least) their raw outputs on the first run by generating artificial noise in later rounds, with the level of extra noise chosen to depend suitably on the output values. Such noise statistically affects the length of the output random strings on later rounds. In this way, suitably programmed devices could ultimately allow Eve to infer all the raw outputs from the first round, given observation of the key string lengths created in later rounds. This makes the round one QRE insecure, since given the raw outputs for round one, and knowing the protocol, Eve knows all information about the output random string for round one, except that determined by the secret random seed. One defence against this would be to fix a length L for the random string generated corresponding to a maximum acceptable noise level, and then to employ the Procrustean tactic of always reducing the string generated to length L, regardless of the measured noise level. Even then, though, unless some restriction is placed on the number of uses, the abort attack on QKD protocols described in the main text also applies here. The devices have the power to cause the protocol to abort on any round of their choice, and so – if she is willing to wait long enough – Eve can program them to communicate any or all information about their round 1 raw outputs by choosing the round on which they cause an abort. We also described in the main text a moderately costly but apparently effective defence against abort attacks on QKD protocols, in which Alice and Bob each have several isolated devices that independently generate raw sub-keys, which are concatenated and privacy amplified so that exposing a single sub-key does not significantly compromise the final secret key. This defence appears equally effective against abort attacks on deviceindependent quantum randomness expansion protocols. Since quantum randomness expansion generally involves only a single party, these protocols are not vulnerable to the impostor attacks described in the main text. It thus appears that it may be possible in principle to completely defend them against memory attacks, albeit at some cost. It is also worth noting that there are many scenarios in which one only needs short-lived randomness, for example, in many gambling applications, bets are often placed about random data that are later made public. In such scenarios, once such random data have been revealed, the devices could be reused without our attacks presenting any problem. -----
Memory attacks on device-independent quantum cryptography.
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).
2012.0
2012-01-20 00:00:00
https://www.semanticscholar.org/paper/0000c2f981838f81c47759242ea123b6121401a9
Physical Review Letters
True
0002c60ed10a8868930b8f971af29e62b498f6b8
OBSERVARE Universidade Autónoma de Lisboa e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023) # NOTES AND REFLECTIONS PROBLEMS OF EVALUATION OF DIGITAL EVIDENCE BASED ON BLOCKCHAIN TECHNOLOGIES[1] **OTABEK PIRMATOV** [pirmatov.otabek.89@inbox.ru](mailto:pirmatov.otabek.89@inbox.ru) Assistant Professor of the Department of Civil Procedural and Economic Procedural Law, Tashkent State University of Law (Uzbekistan), Doctor of Philosophy in Law (PhD) ## Introduction Digital evidence is fundamentally different from physical evidence and written evidence. Securing physical evidence is primarily to prevent it from being lost or difficult to obtain in the future. Compared to traditional evidence, electronic evidence is fragile, easy to change and delete, and difficult to guarantee its authenticity. For example, data on a personal computer may be lost due to misuse, virus attack, etc. During the preparation of the case, the video can be deleted in order to hide the facts. In fact, most electronic evidence is stored in a central database. If the database is unreliable, the validity of the data is not guaranteed. Obviously, how to ensure the authenticity and integrity of digital evidence is very important when storing it. Because digital evidence is created by special high-tech, it is easier to change it in practice. More attention should be paid to its authenticity. Digital evidence is more likely to be tampered with in practice. The main methods of digital evidence storage (pre-trial provision) in civil court proceedings are as follows: 1) sealing or closing the means of keeping the original of evidence; 2) printing, photographing and sound or visual recording; 1 This text is devoted the issues of evaluation of digital evidence based on blockchain technologies in civil court proceedings. The article states that since it is not possible to change and delete evidence based on block-chain technology, contracts based on blockchain technology and documents issued by government bodies are considered acceptable evidence by the courts. It is highlighted that the usage of evidence based on block-chain technology in conducting civil court cases will prevent the need for notarization of digital evidence by the parties in the future. ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov 3) drawing up reports; 4) authentication; 5) provision through a notary office; 6) storage through block-chain; 7) casting a time stamp (time stamp). Block-chain is a database where data is securely stored. This is achieved by connecting each new record with the previous one, resulting in a chain consisting of data blocks ("block chain" in English)—hence the name. Physically, the blockchain database is distributed, allowing authorized users to independently add data. It is impossible to make changes to previously stored data, as this action will break the chain, and it is "immutability" that makes the block-chain a safe and reliable means of storing digital records in public databases[2]. Officially, the history of “blocks and chains” begins on October 31, 2008, when someone under the pseudonym Satoshi Nakamoto mentioned the blockchain in a white paper (base document) about the network of the first cryptocurrency - bitcoin. The fundamental principles for applying decentralization and immutability to document accounting were laid down as early as the 1960s and 1970s, but the closest to them are the works of scientists Stuart Haber and W. Scott Stornett, who in 1991 described a scheme for sequentially creating blocks in which a hash is located. The technology was even patented, but for its time it became a Da Vinci helicopter - there was no technical possibility to implement the idea, and interest in it disappeared. The patent expired in 2004, just four years before Satoshi and his white paper appeared[3]. ## 1. Literature review S.S. Gulyamov defines block-chain as follows: blockchain (chain of blocks) is a distributed set of data, in which data storage devices are not connected to a common server. These data sets are called blocks and are stored in an ever-growing list of ordered records. Each block will have a timestamp and a reference to the previous block. The use of encryption ensures that users cannot write to the file without them, while the presence of private keys can only modify a certain part of the blockchains. In addition, encryption ensures synchronization of all users' copies of the distributed chain of blocks (Gulyamov, 2019: 114). Primavera De Filippi and Aaron Wright (2018) point out that block-chain technology is different from other electronic evidence because it cannot be forgotten. The technology itself has evidential value for the judicial system. _Markus Kaulartz, Jonas Gross, Constantin Lichti, Philipp Sandner_ define block-chain technology is getting increasingly renowned, as more and more companies develop blockchain-based prototypes, e.g., in the context of payments, digital identities, and the 2 [https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/](https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/) 3 [https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii](https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii) ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov supply chain. One use case of blockchain is often seen in the tamper-proof storage of information and documentation of facts. This is due to the fact that records on a blockchain are “practically resistant” to manipulation as a consequence of the underlying cryptography and the consensus mechanism. If a block-chain is used for storing information, the question arises whether the data stored on a block-chain can be used as evidence in court. In the following article, we will analyze this question[4]. According to Alexey Sereda, the correct usage of blockchain technologies will eliminate the need for lawyers to perform certain mechanical tasks to a significant extent: checking counterparties, contacting other experts (bodies), the need for notarization, etc. All this allows lawyers to focus their efforts on solving other more important tasks[5]. Vivien Chan and Anna Mae Koo define blockchain is a decentralized and open distributed ledger technology. Electronic data (e.g. in a transaction on an e-shopping platform, the transaction time, purchase amount, currency and participants, etc.) will be uploaded to a network of computers in “blocks”. Since the data saved in a blockchain is stored in a network of computers in a specific form and is publicly available for anyone to view, the data is irreversible and difficult to be manipulated. Anyone who has handled an online infringement case knows the race against time in preserving evidence. However, screenshots saved in PDF formats are easy to be tampered with and are of scant probative value before the Chinese courts, unless notarized. Making an appointment with, and appearing before a notary is another timeconsuming and expensive process. With blockchain, these procedures can be simplified and improved in the following ways: 1. E-evidence can be saved as blockchain online instantaneously without a notary public; 2. Cost for generating blockchain evidence is lower than traditional notarization; 3. Admissibility of block-chain evidence has been confirmed by statute and many courts in China because of the tamper-free nature of block-chain technology; 4. Possible combination of online monitoring and evidence collection process: with blockchain technology and collaboration with different prominent online platforms (e.g. Weixin), it is possible to automate online monitoring of your intellectual property—blockchain evidence is saved automatically when potential infringing contents are found[6]. According to Matej Michalko, in the previous trials of dispute cases, evidence preservation usually requires the involvement of a third-party authority such as a notary office, and relevant persons are required to fix the evidence under the witness of the notary. With the more frequent use of electronic evidence, most of the third-party electronic data preservation platforms have investigated the pattern of “block-chain + evidence 4 [www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5) [court-704ab7255cf5](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5) 5 [https://blockchain24.pro/blokcheyn-i-yurisprudentsiya](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya) 6 [https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb](https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb) ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov collection and preservation”, which is applying blockchain technology to the traditional electronic evidence preservation practice (i.e., uploading the preserved evidence to a block-chain platform). If it is necessary, you can apply online for an expert opinion from the judicial expertise center. (Michalko, 2019: 7). Today, the task of providing electronic evidence before the court is carried out by notaries. Data recorded on a blockchain is in essence a chronological chain of digitally signed transactions. Thus, admissibility of block-chain evidence is highly correlated to acceptance of electronic signatures in a legal setting. Not all electronic signatures provide the same level of assurance. (Murray, 2016: 517-519). The usage of this technology when concluding transactions or receiving any official documents from the state greatly simplifies the process of proof, as it allows to track the entire history of changes made to the information stored in the blockchain. It also reliably protects them from illegal attempts to tamper or forge. Such evidence will be nearly impossible to challenge, although the risk of hacking or fraudulent activity remains. Second, if the court session is conducted using video conferencing, the blockchain can be easily used by the participants in the court session. Given the development of remote technologies caused by the coronavirus pandemic, this situation must be taken into account. Thus, thanks to the use of blockchain, it is possible to significantly reduce the time for consideration of cases in courts, increase the transparency of court proceedings and ensure the necessary confidentiality of information. If the contracts concluded by the parties are based on the blockchain technology or if the state authorities draw up their documents based on the blockchain technology, then it would be possible to evaluate the blockchain technology as evidence by the courts. Now in our country, government bodies are signing their documents with Q-code. According to Boris Glushenkov, the successful implementation of the blockchain will also change the courts: firstly, there will be no need to make decisions for concrete things. Second, evidence changes: electronic evidence is viewed with skepticism in courts. Maybe blockchain can change that[7]. In civil litigation, evidence was evaluated as evidence only if it met each of the criteria of relevance, admissibility, and reliability. Likewise, numerical evidence must meet the requirements of relevance, acceptability, and reliability of evidence evaluation criteria. Failure to evaluate digital evidence with one of the evidentiary evaluation criteria may result in its inadmissibility as evidence in court. According to Yuhei Okakita, In civil litigation, any form of evidence can generally be submitted to the court. That is, the court accepts not only physical documents but also digital data as evidence. Of course, civil procedure laws vary from country to country, but electronic evidence is recognized in many legislations such as the EU, the United States, or Japan. Since it can be said that blockchain certificates are a kind of digital data, it should be accepted in most courts as admissible evidence. 7 [https://blockchain24.pro/blokcheyn-i-yurisprudentsiya](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya) ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov So, you can submit the certificate to the court. However, the question is how judges evaluate the evidence. Let's to through an example relevant for e.g. the German or Japanese system: in these systems, it is up to the discretion of the judge to decide whether the certificate will be taken into consideration. If the judge believes the authenticity of the certificate, it will become the basis of the judgment. Let's suppose that the claim of a defendant in a dispute could be validated with the data certified with a blockchain transaction. The judge decides on the authenticity of the submitted evidence based on the opinions of both parties. The defendant will explain the concept of blockchain immutability achieved with the consensus mechanism, and the other party will argue the possibility that the information on the blockchain has been tampered with. After the judge considers both stories and takes a position regarding the authenticity of the information, s/he will make a decision accordingly[8]. According to Zihui (Katt) Gu, For the blockchain evidence to be admissible, the authenticity of the source of the electronic data must first be confirmed, whether through examination of the original or comprehensive consideration of all the evidence at hand[9]. The admissibility of digital evidence is one of the problems of judicial evaluation of evidence in civil litigation. In ensuring the admissibility of electronic evidence in foreign countries, transferring it to the blockchain software or evaluating the evidence in the blockchain software as admissible evidence is of great importance. According to Van Yojun, if blockchain technology can be applied to any digital evidence, regardless of whether it is a criminal or civil trial, the general expected benefits can be achieved, including: ensuring the integrity and accuracy of data, preventing the tampering of data or evidence, increasing the transparency of legal proceedings, Court proceedings are easy to follow, accelerated and simplified[10]. ## 2. Issues of application of blockchain technology in the legislation of foreign countries The Federal Government of the United States has not exercised its constitutional power to implement legislation regulating the admissibility of blockchain evidence in court. Thus, states enjoy residual power to implement their own legislation. The Federal Rules of Evidence establish a minimum requirement in what is referred to as the ‘best evidence rule which establishes that the best evidence must be used at trial. Rule 1002 of the Federal Rules of Evidence states “An original writing, recording, or photograph is required in order to prove its content unless these rules or a federal statute provides otherwise”. Several states have regulated blockchain through introducing their own legislation and rules, particularly with regard to the regulation of cryptocurrency – or as termed by various legislators, virtual currencies. New York kickstarted legislative developments in 8 [https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation) [ip-litigation](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation) 9 [http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/](http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/) 10 [https://www.ithome.com.tw/news/130752](https://www.ithome.com.tw/news/130752) ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov the USA through the regulation of virtual currency companie, and eventually several states followed suit, with 32 states implementing their own rules and regulations. The states of Illinois, Vermont, Virginia, Washington, Arizona, New York and Ohio have passed or introduced legislation which specifically regulates the admissibility of blockchain evidence in court[11]. In April 2018, 1 22 member states signed the Declaration for a European Blockchain Partnership (EBP) in order to “cooperate on the development of a European Blockchain Services Infrastructure.”2 With its ambitious goal of identifying initial use cases and developing functional specifications by the end of the year, the EBP should be an important catalyst for the use of blockchain technology by European government agencies[12]. In October 2018, discussions were underway among the Azerbaijani Internet Forum (AIF) for the Ministry of Justice to implement blockchain technology in several departments within its remit. Currently, the Ministry provides more than 30 electronic services and 15 information systems and registries, including “electronic notary, electronic courts, penitentiary service, information systems of non-governmental organizations”, and the register of the population, among others. Part of the AIF’s plans is to introduce a “mobile notary office” which would involve the notarization of electronic documents. Through this process, the registry’s entries will be stored on blockchain which parties will be able to access but not change, thus preventing falsification. Future plans also include employing smart contracts in public utility services such as water, gas and electricity[13]. Blockchain technology is a new way to build a network. Today, almost all service systems in the Internet system work on the basis of a centralized network, that is, the data warehouse is located on a central server, and users receive data by connecting to this server. The main difference of blockchain technology is that there is no need for a central server and all network participants have equal rights. The network database is kept by each user. One of the main reasons why evidence based on blockchain technology is considered admissible by courts is that blockchain technology is transparent, that is, it is not affected by the human factor. According to the Decision of the President of the Republic of Uzbekistan dated July 3, 2018, "On measures to develop the digital economy in the Republic of Uzbekistan": − basic concepts in the field of "blockchain" technologies and principles of its operation; − powers of state bodies, as well as process participants in the field of "blockchain" technologies; − measures of responsibility for using "blockchain" technologies for illegal purposes. The State Services Agency of the Republic of Uzbekistan has decided that starting from December 2020, the country's registry offices will operate based on blockchain technology. However, as of today, this system has not yet been launched. It would be 11 [https://blog.bcas.io/blockchain_court_evidence](https://blog.bcas.io/blockchain_court_evidence) 12 [https://www.eublockchainforum.eu/reports](https://www.eublockchainforum.eu/reports) 13 [https://blog.bcas.io/blockchain_court_evidence](https://blog.bcas.io/blockchain_court_evidence) ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov appropriate if the documents issued not only by registry authorities, but also by tax authorities, cadastral departments, transactions concluded by notary offices, and most importantly, decisions of district and city mayors and reports issued by electronic auction, e-active, would be accepted based on blockchain technology. Agreements concluded by notary offices in civil courts, decisions of district and city mayors, and reports issued by electronic auction serve as the main written evidence confirming ownership rights. Due to the widespread involvement of information technologies in all spheres of social life in our country, the above bodies are also moving to receive documents in electronic form. Also, distribution of electricity based on blockchain technology is being carried out in Uzbekistan based on South Korean technology. Perhaps, in the future, electricity contracts in our country may be concluded on the basis of blockchain technology. ## 3. Discussion With the development of the Internet and information technology, digital data has gradually become an important part of the evidence system in civil court cases, which cannot be ignored. Among all types of digital data, blockchain evidence is a relatively new type. A proper blockchain is not a proof itself, but a technical implementation method of storing, transporting and correcting digital data. Blockchain is just a storage technology, the purpose of which is to ensure the authenticity and reliability of digital data. The most important thing is to determine the authenticity of the digital data. Improvements in blockchain technology can make electronic documents flow more quickly and improve the efficiency of their assessment in courts. However, compared to the traditional notarization method of securing electronic evidence, blockchain-based evidence storage lags behind. That is, there are not enough normative legal documents on the implementation of blockchain technologies in the field of justice. Notarization, which has become a means of preventing falsification of electronic documents, is rarely used in legal practice, because notarization of electronic evidence requires excessive time and money for the parties. It includes digital signatures, reliable time stamps and hash value verification to prove the authenticity of the submitted data using blockchain technology. Parties must be able to demonstrate how blockchain technology has been used to collect and store evidence. Due to the decentralization of information in the blockchain network, it is very difficult for hackers to exploit. Additionally, since each block contains the hash of the previous block, any transaction within the blockchain is done by changing it. Check Hash Value: After computing any electronic file using hash algorithm, only one hash value can be obtained. If the content of the electronic file changes, the resulting hash value will also change. The uniqueness and non-repeatability of the hash value ensures the immutability of electronic files. ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov The verifier can use the hash value written to the blockchain to verify the original data to verify that the data is valid and has not been tampered with. Encrypting evidence can also ensure its safe storage. At a basic level, encryption uses a secret key to ensure that only those with access can read the file by encrypting the file's contents. It is possible to prepare documents based on blockchain technology in applications such as SharpShark, SynPat, WordProof, Waves, EUCD, DMCA. The main reason why evidence based on blockchain technology is considered acceptable evidence in foreign countries is its technological structure. We can see the following unique features of it: - at the discretion of one of the parties, it is not possible to change and add (falsify and destroy) documents based on blockchain technology; - documents based on blockchain technology are a technology resistant to hacker attacks, which means that electronic evidence based on blockchain technology cannot be tampered with by third parties; - in blockchain technology, there is no need for a central server, and all network participants have equal rights. A network database stores every user in it. The lack of possibility of falsification and alteration of the evidence based on blockchain technology makes it considered acceptable evidence by the courts. According to the civil procedural law, the admissibility of the evidence must be confirmed by certain means of proof according to this law. In order to ensure the admissibility of electronic evidence, it is appropriate to create electronic documents, electronic transactions using blockchain technology, and to improve the legislation in this regard. The following features of blockchain evidence should be considered: 1. To review the authenticity of the blockchain evidence. Specifically, it means that the court should examine whether the blockchain evidence is likely to be tampered with in the process of formation, transmission, extraction and display, and to the extent of such possibility. 2. To review the legitimacy of the blockchain evidence. Specifically, it means that the court should examine whether the collection, storage and extraction methods of blockchain evidence comply with the law, and whether they infringe on the legitimate rights and interests of others. 3. To review the relevance of blockchain evidence. Specifically, it means that the court should examine whether there is a substantial connection between the blockchain evidence and the facts to be proved[14]. 14 [https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts) [courts](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts) ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov ## Conclusion Blockchain storage solves the problem of securely storing digital data. In a sense, blockchain storage is an authentication or auxiliary storage method. Currently, blockchain storage is a more indirect authentication method. One of the peculiarities of blockchain technology in legal science is that the use of this technology when concluding transactions or obtaining any official documents from government authorities greatly simplifies the process of proof. Due to this, the blockchain allows to track the entire history of changes made to the data stored in the "data" and reliably protects against illegal attempts to tamper with or falsify the data. Such evidence would be nearly impossible to challenge, but the risk of hacking or fraudulent activity remains, albeit partially. Second, if court hearings are held online, the possibility of blockchain use by court hearing participants will increase even more. Thus, due to the use of blockchain, it is possible to significantly reduce the time of consideration of cases in civil courts and to increase the transparency of judicial processes and ensure the necessary confidentiality of information. Because public offering of goods and services on social networks has become popular in our country. Purchase of goods and services on social networks is carried out through mutual correspondence. Correspondence in the social network can be deleted or changed. This creates problems in evaluating social network correspondence as evidence in civil courts. The adoption of blockchain technologies by social networks may also lead to the use of social media correspondence as evidence in courts in the future. ## References Blockchain 24, consulted online, available at [https://blockchain24.pro/blokcheyn-i-](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya) [yurisprudentsiya](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya) Chan, Viviene (2020). Blockchain Evidence in Internet Courts in China: The Fast Track for Evidence Collection for Online Disputes. Consulted online, available at [https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-](https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb) [5260a2e4b9bb](https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb) De Filippi, Primavera and Wright, Aaron (2018). _Blockchain and the Law: The Rule of_ _Code. Harvard University Press._ Du, Guodong and Yu, Meng (2021). “When Blockchain Meets Electronic Evidence in China's Internet Courts”, China Justice Observer Consulted online, available at [https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts) [in-china-s-internet-courts](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts) European Union blockchain observatory & forum, blockchain for government and public [services (Dec. 7, 2018), https://www.eublockchainforum.eu/reports](https://www.eublockchainforum.eu/reports) ----- JANUS.NET, e journal of International Relations e-ISSN: 1647-7251 Vol. 14, Nº. 1 (May-October 2023), pp. 279-288 _Notes and Reflections_ _Problems of evaluation of digital evidence based on blockchain technologies_ Otabek Pirmatov Fedorov, Pavel (2022). “What is blockchain: everything you need to know about the technology”, Forbes, consulted online, available at [https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-](https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii) [tehnologii](https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii) Gazeta.uz (2022). Blockchain technology is not a problem, but it is a problem that has _to_ _be_ _solved._ Consulted online, available at [https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/](https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/) # Gross, Jonas (2020). Legal aspects of blockchain technology. Consulted online, availabe at [www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5) [blockchain-as-evidence-in-court-704ab7255cf5](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5) Gulyamov, S. (2019). Blockchain technologies in the digital economy. Textbook, p. 114. iThome (2022). Taiwan Takes the Lead in Judicial Blockchain Applications] An Inventory _of_ _Global_ _Judicial_ _Blockchain_ _Applications,_ consulted online, available at [https://www.ithome.com.tw/news/130752](https://www.ithome.com.tw/news/130752) Michalko, Matej (2019). “Blockchain ‘witness’: a new evidence model in consumer disputes”. International journal on consumer law and practice. V.7., p.7. Murray, Andrew (2016). Information Technology Law, p. 517-519. Okakita, Yuhei (2020). _Can digital data stored on Blockchain be valid evidence in IP_ _litigation?. Consulted online, available at_ [https://www.bernstein.io/blog/2020/1/17/can-](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation) [digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation) Pollacco, Alexia (2020). _The Interaction between Blockchain Evidence and Courts – A_ _cross-jurisdictional_ _analysis._ _Consulted_ _online,_ _available_ _at_ [https://blog.bcas.io/blockchain_court_evidence](https://blog.bcas.io/blockchain_court_evidence) _The Illinois Journal of Law, Technology & Policy, consulted online, available at_ [http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-](http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/) [opportunities-and-concerns/](http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/) **How to cite this note** Pirmatov, Otabek (2023). Problems of evaluation of digital evidence based on blockchain technologies. Notes and Reflections in Janus.net, e-journal of international relations. Vol. 14, Nº 1, May-October 2023. Consulted [online] on date of last visit, [https://doi.org/10.26619/1647-](https://doi.org/10.26619/1647-7251.14.1.01) [7251.14.1.01](https://doi.org/10.26619/1647-7251.14.1.01) -----
Problems of evaluation of digital evidence based on blockchain technologies
2023.0
NaT
https://www.semanticscholar.org/paper/0002c60ed10a8868930b8f971af29e62b498f6b8
JANUS NET e-journal of International Relation
True
000523657fe1a5879d72c099f619ea0de4424bff
ERROR: type should be string, got "https://doi.org/10.1007/s13762 022 04079 x\n\n**REVIEW**\n\n# Plastic waste recycling: existing Indian scenario and future opportunities\n\n**R. Shanker[2] · D. Khan[2] · R. Hossain[1] · Md. T. Islam[1] · K. Locock[3] · A. Ghose[1] · V. Sahajwalla[1] · H. Schandl[3] ·**\n**R. Dhodapkar[2]**\n\nReceived: 13 December 2021 / Revised: 23 February 2022 / Accepted: 4 March 2022 / Published online: 2 April 2022\n© The Author(s) under exclusive licence to Iranian Society of Environmentalists (IRSEN) and Science and Research Branch, Islamic Azad University 2022\n\n**Abstract**\nThis review article aims to suggest recycling technological options in India and illustrates plastic recycling clusters and reprocessing infrastructure for plastic waste (PW) recycling in India. The study shows that a majority of states in India are engaged\nin recycling, road construction, and co-processing in cement kilns while reprocessing capabilities among the reprocessors\nare highest for polypropylene (PP) and polyethylene (PE) polymer materials. This review suggests that there are key opportunities for mechanical recycling, chemical recycling, waste-to-energy approaches, and bio-based polymers as an alternative\nto deliver impact to India’s PW problem. On the other hand, overall, polyurethane, nylon, and polyethylene terephthalate\nappear most competitive for chemical recycling. Compared to conventional fossil fuel energy sources, polyethylene (PE),\npolypropylene (PP), and polystyrene are the three main polymers with higher calorific values suitable for energy production.\nAlso, multi-sensor-based artificial intelligence and blockchain technology and digitization for PW recycling can prove to be\nthe future for India in the waste flow chain and its management. Overall, for a circular plastic economy in India, there is a\nnecessity for a technology-enabled accountable quality-assured collaborative supply chain of virgin and recycled material.\n\n**Keywords Informal and formal sector · Biological recycling · Chemical recycling · Mechanical recycling · Digitization ·**\nBlockchain technology\n\n\n### Introduction\n\nPlastic has evolved into a symbol of human inventiveness as\nwell as folly which is an invention of extraordinary material\nwith a variety of characteristics and capacities. Although\nIndia is a highly populated country, it is ranked 12th among\nthe countries with mismanaged plastics but it is expected\n\nEditorial responsibility: Maryam Shabani.\n\n- D. Khan\nk.debishree@neeri.res.in\n\n1 Centre for Sustainable Materials Research and Technology,\nSMaRT@UNSW, School of Materials Science\nand Engineering, UNSW Sydney, Sydney, NSW 2052,\nAustralia\n\n2 Council of Scientific and Industrial Research-National\nEnvironmental Engineering Research Institute\n(CSIR-NEERI), Nehru Marg, Nagpur 440 020, India\n\n3 Commonwealth Scientific and Industrial Research\nOrganisation (CSIRO) and Australian National University,\nCanberra, ACT​ 2601, Australia\n\n\nthat by the year 2025, it will be in 5th position (Neo et al.\n2021). Therefore, recycling or upscaling, or reprocessing of\nPW has become the urgency to curb this mismanagement\nof plastics and mitigate the negative impacts of plastic consumption and utilization from the environment. However,\nthis resource has not been given the required attention it\ndeserves after post-consumer use. Recycling or reprocessing\nof PW usually involves 5 types of processes based on the\nquality of the product manufactured upon recycling of the\nwaste, namely upgrading, recycling (open or closed loop),\ndowngrading, waste-to-energy plants, and dumpsites or\nlandfilling, as shown in Fig. 1 (Chidepatil et al. 2020). Usually, the PW is converted into lower-quality products such\nas pellets or granules, or flakes which are further utilized in\nthe production of various finished products such as boards,\npots, mats, and furniture (Centre for Science and Environment (CSE) 2021).\nPlastics have a high calorific value, with polymer energy\nvarying from 62 to 108 MJ/kg (including feedstock energy)\nwhich is much greater than paper, wood, glass, or metals\n(with exception of aluminum) (Rafey and Siddiqui 2021).\n\nV l (0123456789)1 3\n\n\n-----\n\n**Fig. 1 Different processing**\npathways for plastic waste\n(modified from Chidepatil et al.\n2020)\n\nPW mishandling is a significant concern in developing\nnations like India due to its ineffective waste management\ncollection, segregation, treatment, and disposal which\naccounts for 71% of mishandled plastics in Asia (Neo et al.\n2021). Though there are numerous sources for PW the major\nfraction is derived from the post-consumer market which\ncomprises both plastic and non-PWs and therefore, these\nwastes require to be washed and segregated accordingly\nfor conversion into the homogenous mixture for recycling\n(Rafey and Siddiqui 2021). According to a study carried out\nby the Federation of Indian Chambers of Commerce and\nIndustry (FICCI) and Accenture (2020), India is assumed to\nlose over $133 billion of plastic material value over the coming next 10 years until 2030 owing to unsustainable packaging out of which almost 75% of the value, or $100 billion,\ncan be retrieved. This review article focuses on levers and\nstrategies that could be put in place to transition India toward\na circular economy for plastics. This involves two key areas,\nthe first being reprocessing infrastructure in various states\nof India and the performance of the reprocessors in organized and unorganized sectors. The second key area for this\nstudy is an overview of the rapidly evolving area of plastic\nrecycling technologies, including mechanical recycling,\nchemical recycling, depolymerization, biological recycling,\nand waste-to-energy approaches. A brief description of the\ntechnologies is provided and their applicability to the Indian\ncontext discussed along with the role of digitization in PW\nrecycling.\n\n## 1 3\n\n\n### Research motivation and scope of the article\n\nThe research on Indian PW and its recycling pathways\naccording to the polymer types and its associated fates were\nstudied along with the published retrospective and prospective studies. Due to COVID-19, there is an exponential\nincrease in the PW and the urge to recycle this waste has\nbecome a necessity. Systematic literature studies from database collection of Web of Science (WoS) were performed\nwith keywords such as “PW recycling technologies in India”\nOR “PW management in India” OR “plastic flow in India”\nfrom 2000 to October 2021 (including all the related documents such as review papers, research papers, and reports)\nwhich in total accounted for 2627 articles only. When the\nsame keyword “plastic recycling” was searched without\ncontext to India, 5428 articles were published from 2000\nto 2021 among which only 345 articles were published by\nIndian authors. Figure 2 shows the distribution of papers on\nPW and related articles over the years. However, the number\nof review articles remains very limited concerning published\nresearch papers and reports for the same. Review articles\nplay a vital role in the substantial growth in the potential\nresearch areas for the enhancement of the proper management strategies in the respective domains. Recently, PW\nand its sustainable management necessity toward achieving\na circular economy have attracted researchers, due to its detrimental effects on humans and the environment.\n\n\n-----\n\n**Fig. 2 Yearly distribution of**\npapers related to plastic waste\nrecycling from 2000 to October\n2021\n\n\n640\n\n600\n\n560\n\n520\n\n480\n\n440\n\n400\n\n360\n\n320\n\n280\n\n240\n\n200\n\n160\n\n120\n\n\n### Reprocessing infrastructure and recycling rates for different types of plastics\n\nRecycling rates of plastics vary between countries depending upon the types of plastic. Some polymers are recycled\nmore than other types of polymers due to their respective\ncharacteristics and limitations. While PET (category 1) and\nHDPE (high-density polyethylene) (category 2) are universally regarded as recyclable, PVC (polyvinyl chloride) (category 3) and PP (category 5) are classified as “frequently\nnot recyclable” owing to their chemical characteristics, however, they may be reprocessed locally depending on practical\nconditions. LDPE (low-density polyethylene) (category 4)\nis however difficult to recycle owing to stress failure, PS\n(category 6) may or may not be recyclable locally, and other\ntypes of polymers (category 7) are not recyclable due to the\nvariety of materials used in its manufacturing (CSE 2021).\nAbout 5.5 million metric tonnes of PW gets reprocessed/\nrecycled yearly in India, which is 60% of the total PW produced in the country where 70% of this waste is reprocessed\nin registered (formal) facilities, 20% by the informal sector\nand the rest 10% is recycled at household level (CSE 2020).\nThe remaining 40% of PW ends up being uncollected/littered, which further results in pollution (water and land) and\nchoking of drains (CSE 2019a). PW is dumped into landfills\nat a rate of 2.5 million tonnes per year, incinerated at a rate\nof over 1 million tonnes per year, and co-processed as an\nalternative energy source in blast furnaces at a rate of 0.25\nmillion tonnes per year by cement firms (Rafey and Siddiqui\n2021). Thermoset plastics (HDPE, PET, PVC, etc.), which\n\n\n110 119\n85 [102 ]86 87\n76\n66\n\n35 41\n1 5 8 5 4 7 4 11 14 11 15 22\n\nResearch Paper Review Articles\n\nare recyclable, constitute 94% of total PW generated, and\nthe remaining 6% comprises other types of plastics which\nare multilayered, thermocol, etc. and are non-recyclable\n(CSE 2019b). Plastics such as PP, PS, and LDPE are partially recyclable but generally not recycled in India due to\nthe economic unviability of their recycling processes (CSE\n2020). Figure 3a shows the recycling rates of different kinds\nof plastics in India and Fig. 3b shows the percentage contribution of different recycling options in the Indian context.\n\n#### State‑wise facilities and flows of PW\n\nThe total plastic generation in India by 35 states and union\nterritories accounts for 34,69,780 tonnes/annum (~ 3.47 million tonnes/annum) in the year 2019–2020 (CPCB (Central\nPollution Control Board) 2021). Plastic processing in India\nwas 8.3 Mt in the 2010 financial year and increased to 22 Mt\nin 2020 (Padgelwar et al. 2021). Table 1 shows the state-wise\nPW generation, registered and unregistered plastic manufacturing/recycling units, and multiplayer manufacturing units\nacross the country. Furthermore, the main recycling clusters\nin India are presented in Fig. 4, wherein Gujarat (Dhoraji,\nDaman and Vapi), Madhya Pradesh (Indore), Delhi and\nMaharashtra (Malegaon, Mumbai (Dharavi and Bhandup),\nSolapur) are the main recycling hubs (Plastindia Foundation\n2018). Recycling processes and disposal methods for PW\nvary substantially across the states in India given in Table 1.\nDetails of some of the major infrastructure available in the\nstates are described in the following subsection.\n\n## 1 3\n\n\n-----\n\n**Fig. 3 a Recycling rates of**\ndifferent types of plastics in **(a)** 2.4%\nIndia (data extracted from CSE 7.6%\n2019b) and b percentage contribution of different recycling\noptions in the Indian context\n(CSE 2021)\n\n25%\n\n20%\n\nPVC HDPE\n\nThe door-to-door collection of solid waste is the most\ncommon practice for the collection of waste in almost all the\nstates. Urban Local Bodies (ULBs) of some states like Goa,\nHimachal Pradesh, Maharashtra, Uttarakhand, and West\nBengal are actively involved in the collection and segregation of waste (CPCB 2019; Goa SPCB 2020; MPCB 2020).\nFurther after collection and segregation of waste, the PW is\nsent to various disposal (landfills) and recycling pathways\n(recycling through material recovery, road construction,\nwaste-to-energy plants, RDF (refused derived fuel), etc.).\nGoa is the state where new bailing stations have been set up\nin addition to the existing facilities for the disposal of PW\n(Goa SPCB 2020). State like Kerala has taken the initiative\nfor the installation of reverse vending machines (RVMs) for\nplastic bottles in supermarkets and malls whereas Maharashtra ensures 100% collection of waste with proper segregation and transport of PW where 62% of the waste is being\nreprocessed through different methods (Kerala SPCB 2020;\nMPCB 2020). Special Purpose Vehicles (SPVs) in Punjab\nhave been effective for the collection of multilayered plastics\n(MLP) waste from different cities of the state and further\nbeing sent to waste-to-energy plants (Punjab Pollution Control Board (PPCB) 2018). Though almost all the states have\nimposed a complete ban on plastic bottles and bags, Sikkim\nwas the first state who enforce the ban into the state which\nresulted in the reduction in its carbon footprint (MoHUA\n2019). Many states such as Puducherry, Odisha, Tamil Nadu,\nTelangana, Uttar Pradesh, and West Bengal send their PW\nfor reprocessing in cement kilns (CPCB 2019). Some states\nlike Telangana have taken the initiative for source segregation of the waste from the households by separating the\nbins into dry and wet waste bins whereas the mixed waste\nis sent for further processing for road construction or in\ncement industries (Telangana State Pollution Control Board\n\n## 1 3\n\n\n(TSPCB) 2018). Along with all these facilities in different\nstates, several informal and unregistered recyclers are also\ncontributing to their best to combat PW mismanagement.\n\n#### Formal and informal sectors in India and their performance\n\nThe informal sector currently contributes 70% of PET recycling in India (Aryan et al. 2019). Approximately 6.5 tonnes\nto 8.5 tonnes per day of PW is collected by itinerant waste\nbuyers (IWBs) and household waste collectors in India, out\nof which 50–80% of PW is recycled (Nandy et al. 2015).\nKumar et al. (2018) mentioned that the average PW collected\nby a waste picker and an IWB was approximately 19 kg/d\nand 53 kg/d, respectively. According to ENF (2021), there\nare approximately 230 formal PW reprocessors in India,\nwho can recycle various types of the polymer as shown in\nFig. 5. However, the organized and unorganized sectors play\na vital role in the reprocessing of plastics in India. Table 2\nshows the distribution of organized and unorganized sectors along with the percentage growth in India. Most of the\noperations are currently related to mechanical recycling producing granules/pellets and flakes. In 30 states/UTs, there\nare 4953 registered units with 3715 plastic manufacturers/\nproducers, 896 recyclers, 47 compostable manufacturing,\nand 295 multilayered packaging units however, 823 unregistered units have been reported from different states (CPCB\n2021). However, data on reprocessing capability (material\nprocessed in terms of tonnes/year) of the individual recyclers\nare not readily available. With the limited data, it varies from\n2500 to 3000 tonnes/year whereas capacity for processing\nvarious PW varies from 600 to 26,250 tonnes/year (ENF\n2021).\n\n\n-----\n\n**Table 1 Plastic generation, plastic manufacturing, and recycling units in different states in India and status of plastic recycling and disposal in**\ndifferent states\n\n\nPossible recycling and\ndisposal methods involved\n\n\nMultilayer\nmanufacturing\nunits\n\n\nStates/UT Plastic generation (tonnes/\nannum)\n\n\nRegistered plastic manu- Unregistered plastic\nfacturing/recycling units manufacturing/recycling\nunits\n\n\nAndaman and Nicobar 386.85 – – – Recycling, Road construction\nAndhra Pradesh 46,222 Manufacturing units— – – Recycling, Road construc131 tion, Co-processing in\nCompostable units—1 cement kilns\n\nArunachal Pradesh 2721.17 – – – No information\nAssam 24,970.88 Manufacturing units—18 – 5 Road construction, Coprocessing in cement\nkilns\nBihar 4134.631 Manufacturing/Recycling Producers—225 – No information\nunits—8 Brand owners—203\nRecyclers—36\n\nChandigarh 6746.36 Recycling units—7 – – RDF processing plant\nChhattisgarh 32,850 Manufacturing units—8 – – Recycling, Co-processing\nRecycling units—8 in cement kilns, Wasteto-energy plant\nDaman Diu & Dadra 1947.7 343 – – No information\nNagar Haveli\n\nDelhi 230,525 Producers—840 – – Waste-to-energy plant\nGoa 26,068.3 Manufacturing units—35 – 1 Recycling, Co-processing\nCompostable unit—1 in cement kilns, Sanitary landfills\nGujarat 408,201.08 Manufacturing/Recycling – 10 Co-processing in cement\nunits—1027 kilns\nCompostable units—12\n\nHaryana 147,733.51 Manufacturing units—69 – 28 Road construction\nCompostable unit—1\n\nHimachal Pradesh 13,683 No information 24 79 Road construction, Coprocessing in cement\nkilns, Waste-to-energy\nplants\nJammu & Kashmir 74,826.33 259 45 – No information\nJharkhand 51,454.53 Manufacturing units—59 – – Road construction, Coprocessing in cement\nkilns, Reverse Vending\nMachines\nKarnataka 296,380 Manufacturing/Recycling 91 – Recycling, Co-processing\nunits—163 plants\nKerala 131,400 Manufacturing units— – – Recycling\n1266\nProducers—82\nRecycling units—99\nCompostable unit—1\n\nLakshadweep 46 – – – Recycling\nMadhya Pradesh 121,079 Manufacturing and Recy- – 22 Recycling, Road construccling units—164 tion, Co-processing in\nCompostable unit—1 cement kilns\n\nMaharashtra 443,724 Recycling units—62 42 – No information\nCompostable manufacturing units—6\n\nManipur 8292.8 Manufacturing units—4 – – No information\nMeghalaya 1263 4 – – Road construction\nMizoram 7908.6 – – – Recycling\n\n## 1 3\n\n\n-----\n\n**Table 1 (continued)**\n\nStates/UT Plastic generation (tonnes/\nannum)\n\n\nPossible recycling and\ndisposal methods involved\n\n\nRegistered plastic manu- Unregistered plastic\nfacturing/recycling units manufacturing/recycling\nunits\n\n\nMultilayer\nmanufacturing\nunits\n\n\nNagaland 565 Manufacturing units—4 – – Recycling, Road construction\nOdisha 45,339 Manufacturing units—13 – 3 Co-processing in cement\nkilns\nPunjab 92,890.17 Manufacturing/Recycling 48 4 Recycling\nunits—187\nCompostable units—2\nMaterial Recovery Facility—169\n\nPuducherry 11,753 Manufacturing/Recycling – 4 Road construction, Counits—49 processing in cement\nCompostable unit—1 kilns\n\nRajasthan 51,965.5 Manufacturing units—69 – 16 No information\nSikkim 69.02 – – – No information\nTamil Nadu 431,472 Manufacturing units—78 – 3 Recycling, Road construcRecycling units—227 tion, Co-processing in\ncement kilns\nTelangana 233,654.7 Manufacturing/Recycling – 2 Recycling, Road construcunits—316 tion, Co-processing in\ncement kilns\nTripura 32.1 Manufacturing units—26 – 2 No information\nRecycling units—4\n\n\nUttarakhand 25,203.03 Manufacturing/Recycling\nunits—33\nCompostable units—2\n\n\n15 28 Recycling\n\n\nUttar Pradesh 161,147.5 Manufacturing units—99 23 63 Road construction, CoRecycling units—16 processing in cement\nCompostable units—4 kilns, Waste-to-energy\n\nplant, Production of fibers and raw materials\nWest Bengal 300,236.12 Manufacturing/Recycling – 9 Road construction\nunits—157\nCompostable unit—1\n\nData sources: (Central Pollution Control Board 2019; Central Pollution Control Board 2021; CSE 2020; Goa State Pollution Control Board\n2020; Tamil Nadu Pollution Control Board 2020; Haryana State Pollution Control Board 2020; Jammu and Kashmir State Pollution Control\nBoard 2018; Kerala State Pollution Control Board 2020; Maharashtra Pollution Control Board 2020; Uttarakhand Pollution Control Board 2019;\nUttar Pradesh Pollution Control Board 2021)\n\n\nIn the Indian context, the scale of operation and quantity of material handled by the formal sector is insignificant\nwhen compared to the informal sector (Nallathambi et al.\n2018). However, data on the contribution of the informal\nsector in PW recycling in India are very limited (Kumar\net al. 2018). Formal recycling is constrained to clean, separated, pre-consumer waste in a few places in India, even if\nthe states have efficient recycling technology and resources,\nas in Gujarat and Maharashtra (TERI 2021). At present, the\ntotal numbers of organized and unorganized recycling units\nin India are 3500 and 4000, respectively (Satapathy 2017).\nThe formal recyclers face challenges in providing supply\nsecurity for reprocessed plastic materials as the current\nsupply is dominated by informal recyclers (TERI 2021). In\n\n## 1 3\n\n\nrecovering consumer waste (including PW), the informal\nsector and households play a vital role in the waste collection; approximately 6.5–8.5 Mt of PW are collected by\nthese entities, which is about 50–80% of the plastic produced\n(Nandy et al. 2015). PW collection, dismantling, sorting,\nshredding and cleaning, compounding, extrusions (pellet\nmaking) and new product manufacturing are the key activities done by the informal sector PW supply chain in India\n(WBCSD 2017).\nAmong the formal recyclers, Banyan Nation has implemented a proprietary washing technology to remove ink\nand markings from PW in the mechanical recycling process\n(Banyan Nation 2020). The recycler has integrated plastic recycling technology with data intelligence (real-time\n\n\n-----\n\n**Fig. 4 Plastic recycling clusters in India (Plastindia Foundation 2018)**\n\n**Fig. 5 Number of reprocessors** 120\naccording to polymer types\n\n104\n\nin India (ENF 2021). (Abbreviations: ABS: Acrylonitrile 100\nbutadiene styrene; HIPS: High 86\nimpact polystyrene; LLDPE: 80\nLinear low-density polyethyl- 73\nene; PA: Polyamide; PBT: Poly- 64\nbutylene terephthalate; SAN: 60\nStyrene acrylonitrile; POM:\nPolyoxymethylene; PMMA:\nPoly(methyl methacrylate); 40\nTPE: Thermoplastic elastomer)\n\n\n## 1 3\n\n\n-----\n\n**Table 2 Distribution of organized and unorganized plastic recycling units in India (Plastindia Foundation 2019)**\n\nParameters 2018 report 2019 report Percentage growth\n\nNo. of organized recycling units 3500 100 − 93%\nNo. of unorganized recycling units 4000 10,000 60%\nDirect manpower 600,000 100,000 − 83%\nIndirect manpower (including ragpickers) 1 million 1–1.5 million 50% (concerning upper limit)\nAmount of plastic waste recycled 5.5 million metric 6 million metric tonnes 8.3%\ntonnes\n\n\nlocation of informal sector PW collectors and their capacity\nfor waste processing), which has enhanced its performance\nin high-quality waste collection and recycling (Banyan\nNation 2020). The informal sector is largely involved in\nrecycling PET bottles (mainly collection and segregation).\nHorizontal turbo washers and aglow machines are widely\nused in PE granule production by the informal sector (Aryan\net al. 2019). The Alliance of Indian Waste Pickers comprises 30 organizations in 24 cities of the country, working\nin collaboration with waste pickers, acknowledging their\ncontribution, and urging for them to be integrated into the\nwaste management system. For the informal sector, a proper\ncollection network, linking GPS (Global Positioning System) to points of segregation, and tracking vehicles should\nbe considered in a consolidated framework (Jyothsna and\nChakradhar 2020).\nThe organized/formal and unorganized/informal sectors\nare not discrete and do not vie for waste; instead, they are\ninterdependent and coherent as the formal recyclers can\noperate because the informal sector performs the onerous\ntask of conveying utilizable PW to the formal sector in the\nform of aggregates, pellets, flakes and, in a few instances,\neven the finished product. Since formal commodities are\nthe ones who purchase their final goods, the informal sector relies on the formal sector. Furthermore, the informal\nsector's financial capability and ability to invest in infrastructure and equipment to manufacture goods on their own\nare restricted and therefore both communities have a mutual\nrelationship (CSE 2021).\n\n### Overview on plastic recycling technologies and their applicability to India\n\nFrom waste to material recovery, PW recycling can broadly\nbe categorized into mechanical recycling, chemical recycling, biological recycling, and energy recovery (Al-Salem\net al. 2017). The most preferable type of recycling is primary\nrecycling because of its contamination-free feature which\nfurther facilitates a smaller number of operating units resulting in the optimal amount of consumption of energy supply and resources which is further followed by secondary\n\n## 1 3\n\n\nrecycling (mechanical recycling) for recycling PW (CSE\n2021). However, processing difficulties and the quality\nof recyclates are the main drivers for seeking alternative\napproaches (Ragaert et al. 2017). Comparatively, tertiary\nrecycling or chemical/feedstock recycling is a less favored\nalternative because of high production and operational\ncosts, as well as the lack of scalable commercial technology in India whereas quaternary recycling which involves\nenergy recovery, energy from waste, or valorization of PW,\nis least preferred due to uncertainty around propriety and\nprominence of the technology, and the negative potential\nto convert land-based pollution to water and air pollution,\nbut anyhow more preferable than dumping into the landfill\n(Satapathy 2017; CSE 2021). Figure 6 shows the categorization of the recycling process of PW.\n\n#### Recycling technologies\n\n**Mechanical recycling (MR)**\n\nMechanical recycling (also known as secondary, material\nrecycling, material recovery, or back-to-plastics recycling)\ninvolves physical processes (or treatments) that convert PW\ninto secondary plastic materials. It is a multistep process\ntypically involving collection, sorting, heat treatment with\nreforming, re-compounding with additives, and extruding\noperations to produce recycled material that can substitute\nfor virgin polymer (Ragaert et al. 2017; Faraca and Astrup\n2019). It is conventionally capable of handling only singlepolymer plastics, such as PVC, PET, PP, and PS. It remains\none of the dominant recycling techniques utilized for postconsumer plastic packaging waste (PlasticsEurope 2021).\nThere are various key approaches to sorting and separating\nPW for MR, including zig-zag separator (also known as an\nair classifier), air tabling, ballistic separator, dry and wet\ngravity separation (or sink-float tank), froth flotation, and\nelectrostatic separation (or triboelectric separation). There\nare also some newer sensor-based separation technologies\navailable for PW which include plastic color sorting and\nnear-infrared (NIR) (Ministry of Housing & Urban Affairs\n(MoHUA) 2019). Fig. S1 of the supplementary material\n\n\n-----\n\n**Fig. 6 Plastic waste flow and recycling categorization (Modified from FICCI 2016; Sikdar et al. 2020; Tong et al. 2020)**\n\n\nshows the overall mechanical reprocessing infrastructure\nfor plastics.\nAfter the collected plastics are sorted, they are melted\ndown directly and molded into new shapes or are re-granulated (with the granules then directly reused in the manufacturing of plastic products). In the re-granulation process,\nplastic is melted down after being shredded into flakes, then\nprocessed into granules (Dey et al. 2020).\nDegradation and heterogeneity of PW create significant\nchallenges for recyclers involved in mechanical recycling\nas in many cases, recycled plastics do not have the same\nmechanical properties as virgin materials and therefore,\nseveral challenges emerge while recycling mono and mixed\nPW. Furthermore, difficulties in developing novel technologies to remove volatile organic compounds to improve the\nquality of recycled plastics is one of the key technological\nchallenges in mechanical recycling (Cabanes et al. 2020).\nDifferent polymers degenerate under their specific characteristics such as oxidation, light and heat, ionic radiation,\nand hydrolysis where thermal–mechanical degradation and\ndegradation during lifetime are the two ways by which it\n\n\noccurs while recycling or reprocessing of PW (Ragaert et al.\n2017). Faraca and Astrup (2019) also state that models to\npredict plastic performance based on the physical, chemical, and technical characteristics of PW will be critical in\noptimizing these processes. Other than technical challenges,\nthe mechanical recycling process possesses social and economic challenges such as sorting of mixed plastics, lack of\ninvestments and legislation, and quality of recycled products\n(Payne et al. 2019).\n\n**Chemical recycling**\n\nChemical recycling, tertiary recycling, or feedstock recycling refers to the transformation of polymers into simple\nchemical structures (smaller constituent molecules) which\ncan be utilized in a diverse range of industrial applications\nand/or the production of petrochemicals and plastics (Bhagat\net al. 2016; Jyothsna and Chakradhar 2020). This type of\nrecycling directly involves fuel and chemical manufacturers\n(Bhagat et al. 2016). Pyrolysis, hydrogenation, and gasification are some of the chemical recycling processes (Singh\n\n## 1 3\n\n\n-----\n\nand Devi 2019). The food packaging sector could be the\nmain industry to utilize outputs from the chemical recycling\nprocess (BASF 2021).\nWhen molecules, combustible gases, and/or energy are\ngenerated in a thermal degradation process, molecules, combustible gases, and/or energy are generated as multi-stream\noutputs whereas layered and complex plastics, low-quality\nmixed plastics, and polluted plastics are all viable targets\nfor chemical/feedstock recycling (CSE 2021). From an\noperational standpoint, utilizing residual chars and no flue\ngas clean-up requirements are the main advantages, while\nfrom an environmental point of view, reduction in landfilling coupled with reduced GHGs (green-house gases) and\n­CO2 (carbon dioxide) emissions are added benefits. Ease of\nuse in electricity and heat production and easily marketed\nproducts are some of the financial advantages of pyrolysis\n(Al-Salem et al. 2010). Plasma pyrolysis is a state-of-the-art\ntechnology in which thermo-chemical properties are being\nintegrated with pyrolysis (MoHUA 2019). Fig. S2 of the\nsupplementary material shows the chemical valorization of\nwaste plastics. Although, cost and catalyst reuse capability in pyrolysis processes need further investigation (TERI\n2020). Due to high energy requirements and the low price of\npetrochemical feedstock compared to monomers developed\nfrom waste plastics, chemical recycling is not yet common\nat an industry scale (Schandl et al. 2020).\nProcessing of mixed waste remains a difficult task due to\nthe intricacy in the reactions where different types of polymers reflect completely distinct spectra following degradation pathways (Ragaert et al. 2017). The presence of PVC in\nthe waste stream possesses another problem due to its density and removal of hydrochloric acid (HCl) from products\nand thus resulting in incomplete segregation (Ragaert et al.\n2017). Other than this, lack of stable waste supply, suitable\nreactor technology, and presence of inorganics in the waste\nstream possess challenges in the chemical recycling of the\nplastics (Payne et al. 2019). Lack of investments, production\nof by-products and metal-based catalysts systems contribute\nto other significant difficulties in the chemical valorization\nof waste plastics (Cabanes et al. 2020; Kubowicz and Booth\n2017).\n\n**Depolymerization** Depolymerization of the plastics is\nthe result of chemical processing where various monomer\nunits are recovered which can be reused for the production\nof new plastics manufacturing or conversion into their raw\nmonomeric forms through processes such as hydrolysis,\nglycolysis, and alcoholysis (Bhandari et al. 2021; Mohanty\net al. 2021). This process is often used to recover monomers from a recoverable resin's grade to that of virgin resin\nsuch as PET, polyamides such as nylons, and polyurethanes\nwith excellent results, as well as the possibility to restore a\nsignificant resource from commodities that are difficult to\n\n## 1 3\n\n\nrecycle commercially (MoHUA 2019). This is the process\nby which the plastic polymers are converted into sulfur-free\nliquid power sources through chemical recycling where\nthese power sources facilitate energy recovery from PWs\n(Bhandari et al. 2021). According to the studies carried out\non depolymerization of mixed waste plastics, it has been\nreported that even a small quantity, for instance, 1 mg of\nthese plastics can yield 4.5 to 5.9 cal of energy with a little\namount of energy consumption of 0.8–1 kWh/h and therefore, this process can yield additional convenience for the\nhigh-quality recycling which is recently being used for the\nPET (Bhandari et al. 2021; Ellen MacArthur Foundation\n2017; Wołosiewicz-Głąb et al. 2017). In the anoxic conditions and the presence of specific catalytic additives, the\ndepolymerization is accomplished in a specially modified\nreactor where 350 °C is the highest reaction temperature\nwhich is converted to either liquid RDF or different gases\n(reutilized as fuel) and solids (reutilized as fuel in cement\nkilns) (MoHUA 2019).\n\n**Energy recovery** Gasification of PW is performed via reaction with a gasifying agent (e.g., steam, oxygen, and air) at\nhigh temperatures (approximately 500–1300 °C) to produce\nsynthetic gas or syngas. This can subsequently be utilized\nfor the production of many products, or as fuel to generate electricity, with outputs of a gaseous mixture of carbon\nmonoxide (CO), hydrogen ­(H2), carbon dioxide ­(CO2),\nand methane ­(CH4) via partial oxidation (Heidenreich and\nFoscolo 2015; Saebea et al. 2020). The amount of energy\nderived from this process is affected by the calorific input of\nPW where polyolefins tend to display higher calorific values. Table 3 shows calorific values of various plastic polymers and conventional fuels for comparison. Due to flexibil\n**Table 3 The calorific value of popular plastics and conventional fuels**\n(Zhang et al. 2021)\n\nFuel Calorific\nvalue (MJ/\nkg)\n\nPolyethylene 43.3–47.7\nPolypropylene 42.6–46.5\nPolystyrene 41.6–43.7\nPolyvinyl chloride 18.0–19.0\nPolyethylene terephthalate 21.6–24.2\nPolyamide 31.4\nPolyurethane foam 31.6\nMethane 53\nGasoline 46\nKerosene 46.5\nPetroleum 42.3\nHeavy oil 42.5\nHousehold plastic solid waste mixture 31.8\n\n\n-----\n\nity, robustness, and advantageous economics, gasification\nalong with pyrolysis is a leading technology for chemical\nrecycling. Characterization of PW is essential for developing optimal process design, particularly for HDPE, LDPE,\nPP, PS, PVC, and PET (Dogu et al. 2021). CSIR-IIP, India\n(Council of Scientific and Industrial Research-Indian Institute of Petroleum) and GAIL, India (Gas Authority of India\nLtd.) in collaboration, have been successful in producing\nfuel and chemicals from PW where PE and PP plastics have\nbeen converted to diesel, petrochemicals, and gasoline. 1 kg\nof these plastics can yield 850 ml of diesel, 500 ml of petrochemicals, and 700 ml of gasoline, along with LPG (CSIRIIP 2018) where the process ensures 100% conversion with\nno toxic emissions and is suitable for both small- and largescale industries (CSIR-IIP 2018).\n\n**Biological recycling**\n\nBiological recycling or organic recycling involves the breaking of PW with the intervention of microorganisms such as\nbacteria, fungus, or algae to produce biogas ­(CO2 for aerobic\nprocesses and ­CH4 for anaerobic processes). PW may be\nrecycled biologically through two methods namely aerobic\ncomposting and anaerobic digestion (Singh and Ruj 2015).\nAn enzymatic approach for biodegradation of PET is considered an economically viable recycling method (Koshti et al.\n2018). Table S1 in the supplementary data shows microorganisms responsible for the PW degradation process which\ncould be utilized in the biological recycling process. Blank\net al. 2020 reported that non-degradable plastics such as\nPET, polyethylene (PE), and polystyrene (PS) can be converted to biodegradable components such as polyhydroxyalkanoates (PHA) using a combination of pyrolysis and\nmicrobiology, which is an unconventional route to a circular\neconomy. Polyaromatic hydrocarbons, polyhydroxy valerate\n(PHV) and polyhydroxyalkanoate (PHH), polylactide (PLA),\nand other aliphatic polyesters are biodegradable, whereas\nmany aromatic polyesters are highly impervious to microbial\nassault (Singh and Ruj 2015). Fig. S3 of supplementary data\nshows an overview of the biodegradation of plastics.\nOxo-degradable plastics which is one of the major classes\nof bioplastics that possess challenges due to rapid breakage\ninto microplastics when conditions (sunlight and oxygen)\nare favorable (Kubowicz and Booth 2017). The behavior of\nspecific polymers interrupts their degradation into monomers due to which the microbial activity is ineffective for\nnon-hydrolyzable manufactured polymers as the activity of\nthe microorganisms responsible for the degradation differs\nconcerning the environmental conditions (Ali et al. 2021).\nOther challenges include the consumption of energy for\nrecycling and time for degradation of the generated microplastics along with socioeconomic challenges such as more\ntime and capital investment and lack of resources (Kubowicz\n\n\nand Booth 2017). Collection and separation of bio-PW and\na lack of effective policy contribute to some other barriers\nrelated to bio-based polymers and recycling.\n\n### Techno‑economic feasibility of different recycling techniques\n\nThe techno-economic feasibility study provides a medium\nto analyze the utilization (raw materials, resources, energy,\netc.) and end-of-life trail for different recovery pathways\nfor the conversion of PW by qualitative and quantitative\napproaches in technical and financial aspects (Briassoulis\net al. 2021a). The association of technical and economic\nprospects of reprocessing technologies and related products’\nmarket tends to have a compelling impact on the formation\nof policies to reduce PW. Hence, the techno-economic feasibility study is essential for the effective management of\nPW. The disparity in melting points and treatment technologies contributes to the major challenge for the recycling of\nmixed/multilayered plastic packaging waste which affects\nthe quality of the recycled product (Larrain et al. 2021).\nTable 4 shows different parameters for techno-economic\nfeasibility for recycling technologies. Though techno-economic feasibility study facilitates the understanding inadequacy prevails in terms of sustainability. This is overcome\nby Techno-Economic Sustainability Analysis (TESA) which\nstudies alternative methods for feedstock alteration, common\nenvironmental criteria (such as mass recovery efficiency, the\nimpact of additives, and emissions from recycling facility),\nand pathways for recycling and end-of-life of plastic products (Briassoulis et al. 2021b).\n\n### Utilization of PW and recycled products in India and contribution of major players toward plastic sustainability\n\nPost-consumer PW can be utilized to produce several products after recycling, such as laying roads, use in cement\nkilns, pavement blocks, tiles, bricks, boards, and clothes.\nDue to good binding properties, when PW is in a hightemperature molten state, it can be utilized in road laying (Rokade 2012). Mixing PP and LDPE in bituminous\nconcrete significantly increases the durability and fatigue\nresistance of roads (Bhattacharya et al. 2018). Various\nindustries based in different locations of the country utilizes PP, HDPE, and LDPE waste plastics to produce reprocessed granules and further use them in the production of\nchairs, benches, dustbins, flowerpots, plastic pellets, mobile\nstands, etc. Few informal recyclers produce eco-friendly\nt-shirts and napkins from PET waste bottles whereas some\nrecyclers convert PW to office accessories, furniture, and\n\n## 1 3\n\n\n-----\n\n**Table 4 Techno-economic feasibility parameters for recycling technologies (Briassoulis et al. 2021a; CSE 2021; ElQuliti 2016; Fivga and Dimi-**\ntriou 2018; Ghodrat et al. 2019; Larrain et al. 2021; NITI Aayog- UNDP 2021; Singh and Ruj 2015; Volk et al. 2021)\n\nFeasibility parameters Mechanical Chemical Biological for bioplastic\n\n\nTECHNOLOGICAL Type of polymer PET, HDPE, LDPE, PET, PP, PVC, PE, PS,\nlaminated plastics, lowquality mixed plastics\n\nEnergy requirements 300–500 kW/month for 1200–1500 kW for\n30–50 tonnes/month 80–100 kg PW/hour\n(depends on type of technology and polymer type)\n\nTemperature requirement 100–250 °C Pyrolysis—300–900 °C\nPlasma pyrolysis—1730–9730 °C\nGasification—500–1300 °C\n\n\nBio-PET, bio-PE, bio-PP, etc.\n\n40 TJ–1500 TJ (terajoule)\n\n130–150 °C\n\n\nBiodegradability Non-biodegradable Non-biodegradable Mostly biodegradable (PHA,\nPHV, PHH, PLA)\nRaw materials cost Rs. 6–40/kg Rs. 6–40/kg Rs. 10–30/kg\nECONOMICAL Quality of processed materi- Depending on polymer type Depend on type of technol- High-quality compostable\nals ogy and polymer type bio-polymer\nCost of recyclates Rs. 20–150/kg (depends on Rs. 20–40/l (diesel/fuel) Oxo-degradable plastics—Rs.\ntype of polymers and qual- 90–120/kg Biodegradable\nity of recycled products) films/bags—Rs. 400–500/kg\n\nRecycling facilities in India 7000–10,000 15–25 5–10\n(units)\n\nCost requirements (Operat- 50–60 lakhs/annum 50–65 lakhs for 1 TPD 1–2 crores/annum\ning and capital costs) (tonnes per day) plant\n\n\ndecorative garden items. Recycle India Hyderabad, in 2015,\nbuilt houses, shelter bus stops, and water tanks with PW bottles. Further, under this initiative, thousands of chips packets\nwere weaved into ropes, tied to metal frames, and used to\ncreate dining tables. Shayna Ecounified Ltd., Delhi, with the\nCSIR-National Physical Laboratory, Delhi, converted 340\ntonnes of HDPE, LDPE, and PP waste plastics to 11 lakh\ntiles and has commercialized them to other cities such as\nHyderabad, and companies such as L’Oréal International\nand Tata Motors. Further, few recyclers convert PW such as\nmilk pouches, oil containers, shower curtains, and household plastics to poly-fuel (a mixture of diesel, petrol, etc.).\nFew of them collect PET waste and recycle it into clothes,\nautomotive parts, battery cases, cans, carpets, etc. There are\nseveral other non-government organizations (NGOs), companies, and start-ups that are involved in the recycling of PW\nand its conversion to different types of products, even after\npost-consumer use.\nUsing shredded PW, in 2015–16, the National Rural\nRoad Development Agency laid around 7,500 km of roads\nin India. In 2002, Jambulingam Street in Chennai was constructed as the first plastic road in India (TERI 2018). Plastic\nfibers can replace common steel fibers for reinforcement.\nFire-retardant composites with a wide scope of applications\ncould be developed by blending recycled plastics with fly\nash (TERI 2020). HDPE, PVC, LDPE, PP, and PS have\n\n## 1 3\n\n\nyielded conflicting performance measures, which require\nfurther investigation into the performance of the pavement,\nmethods of improving compatibilization between plastic and\nasphalt, and economic and environmental implications of\nthe process.\nFor the reduction in packing, costs and rising issues\nrelated to PW and packaging, FMCGs (fast-moving consumer goods) industries have teamed up with the Packaging\nAssociation of Clean Environment (PACE), have primarily emphasized immediate benefits including a reduction in\nsize and resource consumption where these changes have\npromoted the usage of flexible packaging and pouches over\nrigid packaging forms. Major FMCG companies like Hindustan Unilever (HUL), Nestlé, and P&G have assured that\nthey will reduce the use of virgin plastics in packaging to\nhalf the amount by the year 2025 (PRI 2021). To promote\nthe utilization of recycled plastics, HUL incorporated recycled PET and recycled HDPE in the manufacturing of personal care products (Condillac and Laul 2020). Other companies like L’Oréal and Henkel had successfully eliminated\nPVC in 2018 along with the reduced use of cellophane to\n5.5% in 2019 and reduction in the utilization of carbon black\npackaging to make carbon-free toilet cleaners, respectively\n(PRI 2021). Beverage companies like PepsiCo, Coca-Cola\nIndia, and Bisleri which use a large quantity of PET bottles,\nhave collaborated with several recyclers to upcycle the PW\n\n\n-----\n\nproducts for the production of new recycled utilities such as\nclothes and bags (Condillac and Laul 2020). Similarly, other\ncompanies like Marico and Dabur are also actively involved\nin reducing the use of virgin plastics in its packaging and for\nthe implementation of a recycling initiative where Marico in\ncollaboration with Big Bazaar is providing incentives to the\ncustomers for dropping their used plastic bottles in the stores\nand Dabur is also competing in the race to become among\nfirst Indian FMCG company to be plastic-free (Condillac and\nLaul 2020). On the other side, apart from taking initiatives\nby various FMCG companies, a lot of efforts is being done\nfor the innovation toward plastic-free packaging materials\nand therefore, Manjushree Technopack (Bengaluru, India)\nlaunched its first plant for the production of post-consumer\nrecycled polymer up to 6000 metric tonnes/year to these\nindustries. Other than this, Packmile, a packaging company\nis producing no plastic alternative such as kraft paper (which\nis biodegradable and recyclable) for Amazon India (Condillac and Laul 2020).\n\n### Role of digitization in PW recycling\n\nAs the amount of waste is increasing by each successive\nyear, technology-driven methods can be established for\ncommunities to reduce, reuse and recycle PW in an ecofriendly manner. In light of this, Recykal (in south Indian\ncity Hyderabad), a digital technology firm developed an\nend-to-end, cloud-based fully automated digital solution\nfor efficient waste management by tracking waste collection\nand promoting recycling of non-biodegradable. Its services\nassist in the formation of a cross-value channel coalition and\nthe connection of various stakeholders such as waste generators (commercial and domestic users), waste collectors,\nand recyclers, assuring that transactions between the organizations with 100% transparency and accessibility (Bhadra\nand Mishra 2021). The quantities of waste received per day\nhave risen from 20 to 30 kg in the months following to over\n10,000 to 15,000 kg recently and offer incentives based on\nthe quality of recycled products (Bhadra and Mishra 2021).\nOne such Android-based application is proposed and developed by Singhal et al. (2021), for efficient collection by pickup or drop facility incorporated in the software. Segregation,\nas well as methods for recycling different types of plastics,\nare also suggested and in return, the users are rewarded with\nthe e-coupons accordingly (Singhal et al. 2021).\nFor improvement in plastic recycling, a variety of techniques have been used and blockchain is one among them,\nand it holds promise for enhancing plastic recycling and the\ncircular economy (CE). A distributed ledger, or blockchain,\nis made up of certain immutable ordered blocks which prove\nto be an excellent approach to commence all of their customers' transactions under the same technology (Khadke et al.\n\n\n2021). One such approach is the introduction of Swachhcoin for the management of household and industrial waste,\nand their conversion into usable high-value recoverable\ngoods such as paper, steel, wood, metals, and electricity\nwith efficient and environmentally friendly technologies\n(Gopalakrishnan and Ramaguru 2019). This is a Decentralised Autonomous Organization (DAO) that is controlled unilaterally via blockchain networks which utilize a combination of techniques such as multi-sensor driven AI to establish\nan incremental and iterative chain that relies on information\ntransferred between multiple ecosystem players, analyzes\nthese inputs, and offers significant recommendations based\non descriptive algorithms which will eventually make the\nsystem entirely self-contained, economical, and profitable\n(Gopalakrishnan and Ramaguru 2019). The purpose of AI in\nthis multi-sensor infrastructure purpose is to limit unpredictability and facilitate efficient and reliable separation by training the system to identify and distinguish them appropriately\n(Chidepatil et al. 2020). Most businesses favor blockchain\ntechnology because of its decentralized architecture and low\ntrading costs along with the associated benefits of accessibility, availability, and tamper-proof structures (Khadke et al.\n2021; Wong et al. 2021).\n\n### Discussion\n\nIndia is a major player in global plastic production and manufacturing. Technology, current infrastructure, and upcoming strategies by the Indian government are combined to\nprovide detailed suggestions for policymakers and researchers in the area of achieving a circular economy. The most\nimportant barrier in Indian PW management is the lack of\nsource segregation of the waste. As in many other countries, mechanical recycling is the leading recycling route for\nIndia’s rigid plastics. The influence of thermomechanical\ndeterioration should be avoided to get high-quality recycled\nmaterial with acceptable characteristics. The development\nof advanced quality measurement techniques for technology\nsuch as nondestructive, cost-effective methods to assess the\nchemical structure and mechanical performance could be\nkey to overcoming the obstructions. For instance, the performance of MR can be partially improved through simple\npackaging design improvements, such as the use of a single polymer instead of a multilayer structure. Furthermore,\nPS and PVC could be replaced with PP for the packaging\nfilm market. There are also issues with depolymerization\nselectivity and activity, ability, and performance trade-offs\nthat may need to be addressed before these methods have\nwide applicability. Based on our assessments, Indian policymakers should consider PET, polyamide 6 (PA 6), thermosetting resins, multilayer plastic packaging, PE, PS, PP,\nand fiber-reinforced composites for chemical recycling.\n\n## 1 3\n\n\n-----\n\nAs chemical recycling is innovation-intensive, assessing\neconomic feasibility is the main challenge for developing\ncountries like India. Overall, PUR, nylon, and PET appear\nmost competitive for chemical recycling. The more problematic mixed waste streams from multilayer packaging could\nbe more suited for pyrolysis along with PE, PP, PS, PTFE\n(polytetrafluoroethylene), PA, and PMMA (poly(methyl\nmethacrylate)). Substantial investment is required for\nhydrocracking which can deal with mixed plastics. Better\nguidance on the correct chemical recycling technology for\neach Indian PW stream may require technology readiness\nlevel (TRL) assessments as proposed by Solis and Silveira\n(2020), which require an increased number of projects and\ndata available on the (chemical) process optimization. Compared to conventional fossil fuel energy sources, PE, PP,\nand PS are the three main polymers with higher calorific\nvalue, making them suitable for energy production. There\nare some challenges, however, with this technology, such\nas the identification of specific optimal biodiesel product\nproperties which can be addressed using techniques such as\nLCA (life cycle assessment) and energy-based analysis. As\nthe practical module of the Indian PW management rules\nexplicitly shows the route to oil production from waste, this\nmay indicate a focus on this technology for the country in\nthe future as chemical recycling accounts for only 0.83%\n(as shown in Fig. 3b) among all the recycling technologies.\nAlthough a relatively high cost is associated with bio-polymers at present, it is expected that production costs will\nreduce due to economies of scale in the coming years. There\nare already numerous bioplastic food packaging materials\nin the market. Since food packaging constitutes a large portion of PW in India, a significant impact could be made for\nthe country if it is switched to more sustainable bio-based\npolymers. In India, the J&K Agro Industries Development\nCorporation Ltd, in collaboration with Earth soul, has\nintroduced the first bioplastic product manufacturing facility, with 960 tonnes per year production capacity whereas\nTruegreen (Ahmedabad) can manufacture 5000 tonnes per\nyear. Some of the major manufacturing plants in India are\nBiotech bags (Tamil Nadu), Ravi Industries (Maharashtra),\nEcolife (Chennai). Recently, plant-based bio-polymer has\nbeen introduced by an Indian company named Hi-Tech\nInternational (Ludhiana) to replace single-use and multi-use\nplastic products such as cups, bottles, and straws, which is\nIndia’s only compostable plastic which implies that plastics\nproduced from this bio-polymer will initiate its degeneration within 3–4 months and can completely disintegrate after\n6 months and also, a biodegradable plastic made is converted\nto carbon dioxide and the remaining constituents transforms\ninto water and biomass (Chowdhary 2021). However, there\nare several challenges associated with this technology.\nImprovements are required to sort bioplastic from other PW\ntypes to avoid waste stream contamination. There is also a\n\n## 1 3\n\n\nneed for optimization of anaerobic digestion parameters to\nensure the complete degradation of these materials. From\nthe Indian perspective, feedstock type with their respective\ninfrastructure availability and interactions between sustainability domains is critical for policymaking issues as most of\nthe recycling sectors are operated by informal sector workers. Commercialization of laboratory-based pyrolysis and\ngasification of bioplastic streams should be developed. Due\nto contaminated collection, there is limited recyclability in\nother PW streams, which should be considered as part of\nbio-based PW management. Though India recycles 60% of\nthe total waste generated and its recycling methods are quite\neffective in solving the problem of increasing PW in India,\nthere are still some major challenges or barriers linked with\nit. For more efficient management of all the PW produced,\nstakeholders need to understand and tackle the challenges\nfaced to curb plastic pollution in the country. Different types\nof recycling technologies have their respective associated\nchallenges and barriers (including technological and social)\nwhich need to be addressed as mentioned in Table S2 of the\nsupplementary data.\nRecycled plastics and the products made from these plastics are often expensive from the virgin plastics and therefore\ncompete for their place in the market. The reason behind this\nis the easy availability of raw materials (which are waste\nfrom the petroleum industry) for the production of virgin\nplastics. Other than this, even after mentioning that 60% of\nthe PW is being recycled, a massive amount of this waste\nis found littered and unrecycled in the environment which\ncontradicts the percentage of recycling as there is a lack of\nrelevant and accurate data for the same. Furthermore, Goods\nand Services Tax (GST) also plays a vital role to build market linkages between recycled and virgin products as the\navailability of recycled products is sporadic, the revenue\nor business model tends to collapse for these products and\naffects the recyclers if the PW is being exported where the\nGST rates decreased to 5% from 18% in 2017 (CSE 2021).\nThe increased input costs due to GST and customs taxes are\nbeing transferred to secondary waste collectors by lowering\nthe cost of recycled plastics. For instance, PET bottles were\nRs. 20/kg before GST came in which decreased to Rs. 12/\nkg after GST imposition, milk packets price varied from Rs\n12/kg to Rs 8/kg and similarly, the cost of HDPE dropped by\n30% post-GST (CSE 2021). With the introduction of GST in\nthe plastic value and supply chain, the informal sectors are\nfacing huge losses due to the availability of scrap at cheaper\ncosts. Therefore, the current GST structure has affected the\nmost fragile and vulnerable section of the plastic supply\nvalue chain.\nEnormous studies have been carried out related to different techniques for recycling for various types of polymers,\nvery limited research is available on the techno-economic\nfeasibility of these technologies and therefore, this could\n\n\n-----\n\nprovide a wide scope for the relevant research in India.\nOther than this feasibility study, there is a broad range of\nopportunities and possibilities to explore and analyze the\ntechnologies in India concerning sustainability (involving\nenvironmental and social parameters) through TESA.\nSeveral published reports claim that India recycles 60% of\nthe total PW generated annually which is the highest among\nother countries such as Germany and Austria with more than\n50% recycling. India’s recycling is mostly contributed by the\ninformal sectors but has not been documented accurately by\nthe governing bodies of the country. Moreover, information\non the recycling rate of 60% varies with different sources\nand creates disparity and ambiguity of the data. As depicted\nin Fig. 3b, India recycles 94.17% of waste plastics through\nmechanical recycling, while 0.93% is chemical or feedstock\nrecycling and 5% for energy recovery and alternative uses\nsuch as making roads, boards, and tiles. Compared with\nchemical recycling, mechanical recycling is the most popular technique due to ease of operation and low-cost expenditure as compared to feedstock or chemical recycling in which\nhigh finances and operational costs are involved along with\nthe lack of availability to ascendable technology. Landfill\ndumping is sometimes favored due to improper segregation\nof waste and ease of operation by agencies employed by\nULBs. Other than mechanical and chemical recycling, bioplastics are the emerging alternative for PW in India but lag\ndue to improper legislation, high cost, and unawareness of\nthe segregation of these types of plastics. This can be facilitated if eco-labeling and a proper coding system are introduced. Though these recycling technologies are widely used\nfor reprocessing the PW, elimination of plastics from the\nenvironment is still a far-fetched dream and merely adds a\nfew more years into the end-of-life of the plastics. Therefore,\nthere is a need for affirmative legislation and strict guidelines for the use of recycled products and the exploration of\nalternatives in different sectors. Active involvement of the\ninformal sectors and inclusive growth can be ensured as their\nlivelihood is dependent on PW.\n\n### Conclusion\n\nThe circular economy is a regenerative model which requires\nthe participation of accountable stakeholders. There should\nbe continuous interaction among stakeholders to share current practices dealing with PW as part of the plastic economy. It was found that there was incomplete and indistinct\nreporting on PW generation from individual states. Information exchange via technology application should eventually\nbe an integral part of the PW management value chain. Thus,\ngeneration estimation is an essential task to set targets for\nresource recovery and recycling, which connects the “global\ncommitment” element of the circular plastic economy and\n\n\nwaste minimization. Being part of the global commitment\nto “reducing, circulating and innovating” under the “plastic pact,” a national target could be set and a mechanism is\ndeveloped. In setting a national target, the “dialogue mechanism” would further invigorate inter-and multidisciplinary\nresearch and policy directions. Consumer behavior is an\nessential task as the end-users share equal responsibilities\nas the producer circular economy. Waste management is\na complex multi-actor-based operational system built on\nknowledge, technologies, and experience from a range of\nsectors, including the informal sector. Indigenous innovation\nand research at a regional scale, such as in Gujarat, Andhra\nPradesh, and Kerala, has set an example of a circular plastic\neconomy and would help in developing a further regional\ncircular plastic economy. Efficient recycling of mixed PW\nis an emerging challenge in the Indian recycling sector. As\nplastic downcycling and recycling is an energy-intensive\nprocess, energy supply from renewable energy sources such\nas solar and wind energy can potentially reduce the ­CO2\nemissions produced. The recovery and recycling of substantial volumes of PW need emerging technological and\nspecialized equipment, which in turn necessitates a considerable capital investment. Informal sectors being prominent in\nwaste management may be deprived of recognition, technology, and scientific understanding but their skills, knowledge,\nand experience can be utilized in the value chain of plastic\nflow. Also, there is a need to formalize the informal sectors\nwith proper incentivization and other benefits as they play\na major role in plastic flow in India. Additionally, there are\nno policies or rules for the treatment of the residues from the\nresult of recycling technologies and their production units,\nwhich needs to be addressed as the number of waste residues\ndepends on the quantum of waste and technique incorporated. Universities, research organizations, and most importantly, polymer manufacturers and most important policymakers should collaborate in renewable energy integration\nand process optimization.\nFurther detailed assessment using LCA should be performed in this regard to identify the optimized solutions.\nExtended producer responsibility (EPR) and other policy\nmechanisms would be integrated sooner or later; however,\none of the fundamental aspects is being part of the circular economy. Although segmented, it is believed that the\ninformal sector is very innovative, and they could also be\ntechnologically enabled. New app development and PW\ncollection campaigns through digitalization could increase\nnon-contaminated sources of PW. Specific manufacturing\nsectors such as flexible packaging, automobiles, electrical,\nand electronics should look at the plastic problem through\nthe lens of resource efficiency and climate change ­(CO2 and\nGHGs) perspectives. The sectors should develop innovative solutions so that recycled plastics can be re-circulated\nwithin the sectors where they will be the leading consumer.\n\n## 1 3\n\n\n-----\n\nThough there are a lot of available data on different types\nof recycling of plastics and the state-wise flow of plastics\nthere is no proper information on different types of plastic polymers and their respective flow in the value chain in\ndifferent states/UTs. There is a need for the fortification of\nrecycling different technologies for different polymers and\nfor this purpose, the multi-sensor-based AI and blockchain\ntechnology can prove effective in segregation and recycling\nof the PW in a more environmentally friendly manner which\nshould be implemented in all parts of the country for efficient PW management. Furthermore, the amount of PW can\nonly be controlled by the replacement of new virgin plastics\nand existing plastics with the desired recycled plastics along\nwith citizen sensitization. Overall, for a circular plastic economy in India, there is a necessity for a technology-enabled,\naccountable quality-assured collaborative supply chain of\nvirgin and recycled material.\n\n**Supplementary Information The online version contains supplemen-**\n[tary material available at https://​doi.​org/​10.​1007/​s13762-​022-​04079-x.](https://doi.org/10.1007/s13762-022-04079-x)\n\n**Acknowledgments The authors wish to thank all who assisted in con-**\nducting this work.\n\n**Author contributions All the authors contributed to the study concep-**\ntion and design. Conceptualization and writing of the draft were done\nby Riya Shanker, Dr. Debishree Khan, Dr. Rumana Hossain, Anirban\nGhose, and Md Tasbirul Islam. The draft was revised and edited by\nKatherine Locock with the supervision of Dr. Heinz Schandl, Dr. Rita\nDhodapkar, and Dr. Veena Sahajwalla. All the authors have read and\napproved the final manuscript.\n\n**Funding The authors acknowledge project funding for “India – Aus-**\ntralia Industry and Research\nCollaboration for Reducing Plastic Waste” from CSIRO, Australia,\nthrough contract agreement.\n\n#### Declarations\n\n**Conflict of interest The authors declared that they have no conflict of**\ninterest.\n\n**Ethical approval There is no ethical approval required.**\n\n### References\n\nAl-Salem SM, Antelava A, Constantinou A, Manos G, Dutta A (2017)\nA review on thermal and catalytic pyrolysis of plastic solid waste\n[(PSW). J Environ Manag 197:177–198. https://​doi.​org/​10.​1016/j.​](https://doi.org/10.1016/j.jenvman.2017.03.084)\n[jenvm​an.​2017.​03.​084](https://doi.org/10.1016/j.jenvman.2017.03.084)\n\nAl-Salem SM, Lettieri P, Baeyens J (2010) The valorization of plastic solid waste (PSW) by primary to quaternary routes: From\nre-use to energy and chemicals. Prog Energy Combust Sci\n[36:103–129. https://​doi.​org/​10.​1016/j.​pecs.​2009.​09.​001](https://doi.org/10.1016/j.pecs.2009.09.001)\n\nAli SS, Elsamahy T, Al-Tohamy R, Zhu D, Mahmoud Y, Koutra E,\nSun J (2021) PWs biodegradation: mechanisms, challenges and\n\n## 1 3\n\n\n[future prospects. Sci Total Environ. https://​doi.​org/​10.​1016/j.​](https://doi.org/10.1016/j.scitotenv.2021.146590)\n[scito​tenv.​2021.​146590](https://doi.org/10.1016/j.scitotenv.2021.146590)\n\nSingh AP, Devi AS (2019) PW management: a review. Retrieved\n[from http://​ijasrm.​com/​wp-​conte​nt/​uploa​ds/​2019/​05/​IJASRM_​](http://ijasrm.com/wp-content/uploads/2019/05/IJASRM_V4S5_1488_233_237.pdf)\n[V4S5_​1488_​233_​237.​pdf](http://ijasrm.com/wp-content/uploads/2019/05/IJASRM_V4S5_1488_233_237.pdf)\n\nAnon (2020) Strategies for sustainable plastic packaging in India.\n[FICCI & Accenture. Retrieved from https://​ficci.​in/​spdoc​ument/​](https://ficci.in/spdocument/23348/FICCI-Accenture-Circular-Economy-Report1.pdf)\n[23348/​FICCI-​Accen​ture-​Circu​lar-​Econo​my-​Repor​t1.​pdf](https://ficci.in/spdocument/23348/FICCI-Accenture-Circular-Economy-Report1.pdf)\n\nAryan Y, Yadav P, Samadder SR (2019) Life cycle assessment of the\nexisting and proposed PW management options in India: a case\n[study. J Clean Prod 211:1268–1283. https://​doi.​org/​10.​1016/j.​](https://doi.org/10.1016/j.jclepro.2018.11.236)\n[jclep​ro.​2018.​11.​236](https://doi.org/10.1016/j.jclepro.2018.11.236)\n\nBanyan Nation (2020) Recycling and monitoring PW Flow in the\ncity. ASCI J Manag 49:73–76\n[BASF (2021) Chemical recycling of PW. Retrieved from https://​](https://www.basf.com/in/en/who-we-are/sustainability/we-drive-sustainable-solutions/circular-economy/chemcycling.html)\n\n[www.​basf.​com/​in/​en/​who-​we-​are/​susta​inabi​lity/​we-​drive-​susta​](https://www.basf.com/in/en/who-we-are/sustainability/we-drive-sustainable-solutions/circular-economy/chemcycling.html)\n[inable-​solut​ions/​circu​lar-​econo​my/​chemc​ycling.​html](https://www.basf.com/in/en/who-we-are/sustainability/we-drive-sustainable-solutions/circular-economy/chemcycling.html)\n\nBhadra U, Mishra PP (2021) Extended producer responsibility in\nIndia: evidence from Recykal, Hyderabad. J Urban Manag\n[56:280. https://​doi.​org/​10.​1016/j.​jum.​2021.​07.​003](https://doi.org/10.1016/j.jum.2021.07.003)\n\nBhagat S, Bhardawaj A, Mittal P, Chandak P, Akhtar M, Sharma P\n(2016) Evaluating PW disposal options in Delhi using multicriteria decision analysis. Inst Integr Omics Appl Biotechnol\n7:25–35\nBhandari NL, Bhattarai S, Bhandari G, Subedi S, Dhakal KN (2021)\nA review on current practices of plastics waste management and\n[future prospects. J Inst Sci Technol 26(1):107–118. https://​doi.​](https://doi.org/10.3126/jist.v26i1.37837)\n[org/​10.​3126/​jist.​v26i1.​37837](https://doi.org/10.3126/jist.v26i1.37837)\n\nBhattacharya RS, Chandrasekhar KMV, Deepthi PR, Khan A (2018)\nChallenges and opportunities: plastic management in India.\n[https://​www.​teriin.​org/​sites/​defau​lt/​files/​2018-​06/​plast​ic-​waste-​](https://www.teriin.org/sites/default/files/2018-06/plastic-waste-management_0.pdf)\n[manag​ement_0.​pdf](https://www.teriin.org/sites/default/files/2018-06/plastic-waste-management_0.pdf)\n\nBlank LM, Narancic T, Mampel J, Tiso T, O’Connor K (2020) Biotechnological upcycling of PW and other non-conventional feedstocks\n[in a circular economy. Curr Opin Biotechnol 62:212–219. https://​](https://doi.org/10.1016/j.copbio.2019.11.011)\n[doi.​org/​10.​1016/j.​copbio.​2019.​11.​011](https://doi.org/10.1016/j.copbio.2019.11.011)\n\nBriassoulis D, Pikasi A, Hiskakis M (2021) Recirculation potential of\npost-consumer/industrial bio-based plastics through mechanical\nrecycling-Techno-economic sustainability criteria and indicators.\nPolym Degrad Stab 183:109217\nBriassoulis D, Pikasi A, Hiskakis M (2021) Organic recycling of postconsumer/industrial bio-based plastics through industrial aerobic\ncomposting and anaerobic digestion-Techno-economic sustainability criteria and indicators. Polym Degrad Stab 190:109642.\n[https://​doi.​org/​10.​1016/j.​polym​degra​dstab.​2021.​109642](https://doi.org/10.1016/j.polymdegradstab.2021.109642)\n\nCabanes A, Valdés FJ, Fullana A (2020) A review on VOCs from\n[recycled plastics. Sustain Mater Technol 25:e00179. https://​doi.​](https://doi.org/10.1016/j.susmat.2020.e00179)\n[org/​10.​1016/j.​susmat.​2020.​e00179](https://doi.org/10.1016/j.susmat.2020.e00179)\n\nCentral Pollution Control Board (2019) Annual report for the year\n2018–2019 on implementation of PW management Rules.\n[Retrieved from https://​cpcb.​nic.​in/​uploa​ds/​plast​icwas​te/​Annual_​](https://cpcb.nic.in/uploads/plasticwaste/Annual_Report_2018-19_PWM.pdf)\n[Report_​2018-​19_​PWM.​pdf](https://cpcb.nic.in/uploads/plasticwaste/Annual_Report_2018-19_PWM.pdf)\n\nChidepatil A, Bindra P, Kulkarni D, Qazi M, Kshirsagar M, Sankaran\nK (2020) From trash to cash: how blockchain and multi-sensordriven artificial intelligence can transform circular economy of\n[PW? Adm Sci 10(2):23. https://​doi.​org/​10.​3390/​admsc​i1002​0023](https://doi.org/10.3390/admsci10020023)\n\nCondillac R, Laul C (2020) Megatrend: reducing plastic usage across\n[FMCG value chain. Retrieved from http://​bwhea​lthca​rewor​ld.​](http://bwhealthcareworld.businessworld.in/article/Megatrend-Reducing-Plastic-Usage-across-FMCG-Value-Chain/24-07-2020-300857/)\n[busin​esswo​rld.​in/​artic​le/​Megat​rend-​Reduc​ing-​Plast​ic-​Usage-​](http://bwhealthcareworld.businessworld.in/article/Megatrend-Reducing-Plastic-Usage-across-FMCG-Value-Chain/24-07-2020-300857/)\n[across-​FMCG-​Value-​Chain/​24-​07-​2020-​300857/](http://bwhealthcareworld.businessworld.in/article/Megatrend-Reducing-Plastic-Usage-across-FMCG-Value-Chain/24-07-2020-300857/)\n\n[CPCB Annual Report 2019–2020 (2021). Retrieved from https://​cpcb.​](https://cpcb.nic.in/uploads/plasticwaste/Annual_Report_2019-20_PWM.pdf)\n\n[nic.​in/​uploa​ds/​plast​icwas​te/​Annual_​Report_​2019-​20_​PWM.​pdf](https://cpcb.nic.in/uploads/plasticwaste/Annual_Report_2019-20_PWM.pdf)\n\nCentre for Science and Environment (CSE) (2019a). The plastics\n[factsheet 1. https://​cdn.​csein​dia.​org/​attac​hments/​0.​57139​300_​](https://cdn.cseindia.org/attachments/0.57139300_1570431848_Factsheet1.pdf)\n[15704​31848_​Facts​heet1.​pdf](https://cdn.cseindia.org/attachments/0.57139300_1570431848_Factsheet1.pdf)\n\n\n-----\n\nCentre for Science and Environment (CSE) (2019b) The plastics\n[factsheet 3. https://​cdn.​csein​dia.​org/​attac​hments/​0.​97245​800_​](https://cdn.cseindia.org/attachments/0.97245800_1570432310_factsheet3.pdf)\n[15704​32310_​facts​heet3.​pdf](https://cdn.cseindia.org/attachments/0.97245800_1570432310_factsheet3.pdf)\n\nCSE (2020) Managing PW in India: challenges and Agenda. Retrieved\n[from https://​www.​csein​dia.​org/​conte​nt/​downl​oadre​ports/​10352](https://www.cseindia.org/content/downloadreports/10352)\n\n[CSE (2021) Plastic recycling decoded. Retrieved from https://​www.​](https://www.cseindia.org/plastic-recycling-decoded-10885)\n\n[csein​dia.​org/​plast​ic-​recyc​ling-​decod​ed-​10885.](https://www.cseindia.org/plastic-recycling-decoded-10885)\n[CSIR-IIP (2018) https://​www.​iip.​res.​in/​waste-​plast​ics-​to-​fuel-​and-​petro​](https://www.iip.res.in/waste-plastics-to-fuel-and-petrochemicals/)\n\n[chemi​cals/](https://www.iip.res.in/waste-plastics-to-fuel-and-petrochemicals/)\n\nDey A, Dhumal CV, Sengupta P, Kumar A, Pramanik NK, Alam T\n(2020) Challenges and possible solutions to mitigate the problems\nof single-use plastics used for packaging food items: a review. J\n[Food Sci Technol. https://​doi.​org/​10.​1007/​s13197-​020-​04885-6](https://doi.org/10.1007/s13197-020-04885-6)\n\nDogu O, Pelucchi M, Van de Vijver R, Van Steenberge PHM, D’Hooge\nDR, Cuoci A, Mehl M, Frassoldati A, Faravelli T, Van Geem\nKM (2021) The chemistry of chemical recycling of solid PW via\npyrolysis and gasification: State-of-the-art, challenges, and future\n[directions. Prog Energy Combust Sci 84:100901. https://​doi.​org/​](https://doi.org/10.1016/j.pecs.2020.100901)\n[10.​1016/j.​pecs.​2020.​100901](https://doi.org/10.1016/j.pecs.2020.100901)\n\nEllen MacArthur Foundation (2017) The new plastics economy:\nrethinking the future of plastics and catalysing actions. Retrieved\n[from https://​ellen​macar​thurf​ounda​tion.​org/​the-​new-​plast​ics-​econo​](https://ellenmacarthurfoundation.org/the-new-plastics-economy-rethinking-the-future-of-plastics-and-catalysing)\n[my-​rethi​nking-​the-​future-​of-​plast​ics-​and-​catal​ysing](https://ellenmacarthurfoundation.org/the-new-plastics-economy-rethinking-the-future-of-plastics-and-catalysing)\n\nElQuliti SAH (2016) Techno-economic feasibility study of waste-toenergy using pyrolysis technology for Jeddah municipal solid\nwaste. Int J Power Eng Energy 7(1):622–635\n[ENF (2021) Plastic recycling plants in India. https://​www.​enfre​cycli​](https://www.enfrecycling.com/directory/plastic-plant/India)\n\n[ng.​com/​direc​tory/​plast​ic-​plant/​India](https://www.enfrecycling.com/directory/plastic-plant/India)\n\nPrinciples for Responsible Investments (PRI) (2021) Engaging on\nplastic packaging: Fast Moving Consumer Goods. Retrieved\n[from https://​www.​unpri.​org/​plast​ics/​engag​ing-​on-​plast​ic-​packa​](https://www.unpri.org/plastics/engaging-on-plastic-packaging-fast-moving-consumer-goods/7919.article)\n[ging-​fast-​moving-​consu​mer-​goods/​7919.​artic​le](https://www.unpri.org/plastics/engaging-on-plastic-packaging-fast-moving-consumer-goods/7919.article)\n\nFaraca G, Astrup T (2019) PW from recycling centers: characterization\nand evaluation of plastic recyclability. Waste Manag 95:388–398.\n[https://​doi.​org/​10.​1016/j.​wasman.​2019.​06.​038](https://doi.org/10.1016/j.wasman.2019.06.038)\n\nFICCI (2016) Indian plastic industry: challenges & opportunities.\n[Retrieved from https://​www.​slide​share.​net/​TSMG-​Chemi​cals/​](https://www.slideshare.net/TSMG-Chemicals/indian-plastic-industry-challenges-opportunities)\n[indian-​plast​ic-​indus​try-​chall​enges-​oppor​tunit​ies](https://www.slideshare.net/TSMG-Chemicals/indian-plastic-industry-challenges-opportunities)\n\nFivga A, Dimitriou I (2018) Pyrolysis of PW for production of heavy\nfuel substitute: a techno-economic assessment. Energy 149:865–\n[874. https://​doi.​org/​10.​1016/j.​energy.​2018.​02.​094](https://doi.org/10.1016/j.energy.2018.02.094)\n\nGhodrat M, Alonso JA, Hagare D, Yang R, Samali B (2019) Economic\nfeasibility of energy recovery from waste plastic using pyrolysis\ntechnology: an Australian perspective. Int J Environ Sci Technol\n[16(7):3721–3734. https://​doi.​org/​10.​1007/​s13762-​019-​02293-8](https://doi.org/10.1007/s13762-019-02293-8)\n\nGoa State Pollution Control Board (2020) Annual report for FY\n2019–2020 on implementation of PW (Management and Han[dling) Rules, 2016 as amended 2018. Retrieved from http://​goasp​](http://goaspcb.gov.in/Media/Default/uploads/Annual%20Report%20Plastic%202019-20.pdf)\n[cb.​gov.​in/​Media/​Defau​lt/​uploa​ds/​Annual%​20Rep​ort%​20Pla​stic%​](http://goaspcb.gov.in/Media/Default/uploads/Annual%20Report%20Plastic%202019-20.pdf)\n[202019-​20.​pdf](http://goaspcb.gov.in/Media/Default/uploads/Annual%20Report%20Plastic%202019-20.pdf)\n\nGopalakrishnan P, Ramaguru R (2019) Blockchain-based waste management. Int J Eng Adv Technol 8(5):2632–2635\nHaryana State Pollution Control Board (2020) Annual report under PW\n[management rule for the year 2019. Retrieved from https://​hspcb.​](https://hspcb.gov.in/content/plasticwaste/ARPWM19-20/ARPWM19-20.pdf)\n[gov.​in/​conte​nt/​plast​icwas​te/​ARPWM​19-​20/​ARPWM​19-​20.​pdf](https://hspcb.gov.in/content/plasticwaste/ARPWM19-20/ARPWM19-20.pdf)\n\nHeidenreich S, Foscolo PU (2015) New concepts in biomass gasifi[cation. Prog Energy Combust Sci 46:72–95. https://​doi.​org/​10.​](https://doi.org/10.1016/j.pecs.2014.06.002)\n[1016/j.​pecs.​2014.​06.​002](https://doi.org/10.1016/j.pecs.2014.06.002)\n\nIndian Plastics Industry Report, PlastIndia Foundation (2019).\n[Retrieved from https://​www.​plast​india.​org/​plast​ic-​indus​try-​sta-](https://www.plastindia.org/plastic-industry-status-report.php)\n[tus-​report.​php](https://www.plastindia.org/plastic-industry-status-report.php)\n\nJammu and Kashmir State Pollution Control Board (2018) Annual\n[report 2017–2018. Retrieved from http://​jkspcb.​nic.​in/​Write​](http://jkspcb.nic.in/WriteReadData/userfiles/file/BMW/0.jpg)\n[ReadD​ata/​userf​iles/​file/​BMW/0.​jpg](http://jkspcb.nic.in/WriteReadData/userfiles/file/BMW/0.jpg)\n\nJyothsna TSS, Chakradhar B (2020) Current scenario of PW management in India: way forward in turning vision to reality. In:\n\n\nUrban mining and sustainable waste management. Springer,\nSingapore, pp 203–218\nKerala State Pollution Control Board (2020) Annual report 2019–\n[2020. Retrieved from https://​www.​keral​apcb.​nic.​in/​cmsad​min/​](https://www.keralapcb.nic.in/cmsadmin/fileUploads/Annual%20Report%20PWM%20Rules%202019%20-%202020.pdf)\n[fileU​ploads/​Annual%​20Rep​ort%​20PWM%​20Rul​es%​202019%​](https://www.keralapcb.nic.in/cmsadmin/fileUploads/Annual%20Report%20PWM%20Rules%202019%20-%202020.pdf)\n[20-%​202020.​pdf](https://www.keralapcb.nic.in/cmsadmin/fileUploads/Annual%20Report%20PWM%20Rules%202019%20-%202020.pdf)\n\nKhadke S, Gupta P, Rachakunta S, Mahata C, Dawn S, Sharma M,\nDalapati GK (2021) Efficient plastic recycling and re-molding\ncircular economy using the technology of trust-blockchain. Sus[tainability 13(16):9142. https://​doi.​org/​10.​3390/​su131​69142](https://doi.org/10.3390/su13169142)\n\nKoshti R, Mehta L, Samarth N (2018) Biological recycling of\npolyethylene terephthalate: a mini-review. J Polym Environ\n[26:3520–3529. https://​doi.​org/​10.​1007/​s10924-​018-​1214-7](https://doi.org/10.1007/s10924-018-1214-7)\n\nKubowicz S, Booth AM (2017) Biodegradability of plastics: challenges and misconceptions. [https://​doi.​org/​10.​1021/​acs.​est.​](https://doi.org/10.1021/acs.est.7b04051)\n[7b040​51](https://doi.org/10.1021/acs.est.7b04051)\n\nKumar A, Samadder SR, Kumar N, Singh C (2018) Estimation of the\ngeneration rate of different types of PWs and possible revenue\nrecovery from informal recycling. Waste Manag 79:781–790.\n[https://​doi.​org/​10.​1016/j.​wasman.​2018.​08.​045](https://doi.org/10.1016/j.wasman.2018.08.045)\n\nLarrain M, Van Passel S, Thomassen G, Van Gorp B, Nhu TT, Huysveld S, Billen P (2021) Techno-economic assessment of mechanical recycling of challenging post-consumer plastic packaging\n[waste. Resour Conserv Recycl 170:105607. https://​doi.​org/​10.​](https://doi.org/10.1016/j.resconrec.2021.105607)\n[1016/j.​resco​nrec.​2021.​105607](https://doi.org/10.1016/j.resconrec.2021.105607)\n\nMaharashtra Pollution Control Board (2020) Annual report 2019–2020.\n[Retrieved from https://​www.​mpcb.​gov.​in/​sites/​defau​lt/​files/​plast​](https://www.mpcb.gov.in/sites/default/files/plastic-waste/PWMAnnualreportMPCB201920.pdf)\n[ic-​waste/​PWMAn​nualr​eport​MPCB2​01920.​pdf](https://www.mpcb.gov.in/sites/default/files/plastic-waste/PWMAnnualreportMPCB201920.pdf)\n\nMinistry of Housing & Urban Affairs (MOHUA) (2019) PW manage[ment issues, solutions & case studies. Retrieved from http://​164.​](http://164.100.228.143:8080/sbm/content/writereaddata/SBM%20Plastic%20Waste%20Book.pdf)\n[100.​228.​143:​8080/​sbm/​conte​nt/​write​readd​ata/​SBM%​20Pla​stic%​](http://164.100.228.143:8080/sbm/content/writereaddata/SBM%20Plastic%20Waste%20Book.pdf)\n[20Was​te%​20Book.​pdf](http://164.100.228.143:8080/sbm/content/writereaddata/SBM%20Plastic%20Waste%20Book.pdf)\n\nMohanty A, Borah RK, Fatrekar A, Krishnan S, Vernekar A (2021)\nStepping towards benign alternatives: sustainable conversion of\n[PW into valuable products. Chem Commun. https://​doi.​org/​10.​](https://doi.org/10.1039/D1CC03705F)\n[1039/​D1CC0​3705F](https://doi.org/10.1039/D1CC03705F)\n\nNallathambi M, Prasad G, Samuel, S (2018) Life cycle inventories of\n[plastic recycling—India. Retrieved from https://​www.​ecoin​vent.​](https://www.ecoinvent.org/files/sectorial_report_sri_plastics_report.pdf)\n[org/​files/​secto​rial_​report_​sri_​plast​ics_​report.​pdf](https://www.ecoinvent.org/files/sectorial_report_sri_plastics_report.pdf)\n\nNandy B, Sharma G, Garg S, Kumari S, George T, Sunanda Y, Sinha B\n(2015) Recovery of consumer waste in India—a mass flow analysis for paper, plastic and glass and the contribution of households\nand the informal sector. Resour Conserv Recycl 101:167–181.\n[https://​doi.​org/​10.​1016/j.​resco​nrec.​2015.​05.​012](https://doi.org/10.1016/j.resconrec.2015.05.012)\n\nNeo ERK, Soo GCY, Tan DZL, Cady K, Tong KT, Low JSC (2021)\nLife cycle assessment of PW end-of-life for India and Indonesia.\n[Resour Conserv Recycl 174:105774. https://​doi.​org/​10.​1016/j.​](https://doi.org/10.1016/j.resconrec.2021.105774)\n[resco​nrec.​2021.​105774](https://doi.org/10.1016/j.resconrec.2021.105774)\n\nNITI Aayog-UNDP Handbook on Sustainable Urban PW Management\n[(2021) Retrieved from https://​www.​niti.​gov.​in/​sites/​defau​lt/​files/​](https://www.niti.gov.in/sites/default/files/2021-10/Final_Handbook_PWM_10112021.pdf)\n[2021-​10/​Final_​Handb​ook_​PWM_​10112​021.​pdf](https://www.niti.gov.in/sites/default/files/2021-10/Final_Handbook_PWM_10112021.pdf)\n\nPadgelwar S, Nandan A, Mishra AK (2021) PW management and\ncurrent scenario in India: a review. Int J Environ Anal Chem\n101(13):1894–1906. [https://​doi.​org/​10.​1080/​03067​319.​2019.​](https://doi.org/10.1080/03067319.2019.1686496)\n[16864​96](https://doi.org/10.1080/03067319.2019.1686496)\n\nPayne J, McKeown P, Jones MD (2019) A circular economy approach\nto PW. Polym Degrad Stab 165:170–181. [https://​doi.​org/​10.​](https://doi.org/10.1016/j.polymdegradstab.2019.05.014)\n[1016/j.​polym​degra​dstab.​2019.​05.​014](https://doi.org/10.1016/j.polymdegradstab.2019.05.014)\n\nPlasticsEurope (2021) Recycling and energy recovery. Retrieved from\n\n[https://​plast​icseu​rope.​org/#:​~:​text=​Mecha​nical%​20rec​ycling%​](https://plasticseurope.org/#:~:text=Mechanical%20recycling%20of%20plastics%20refers,chemical%20structure%20of%20the%20material.&text=It%20is%20currently%20the%20almost,99%25%20of%20the%20recycled%20quantities)\n[20of%​20pla​stics%​20ref​ers,chemi​cal%​20str​ucture%​20of%​20the%​](https://plasticseurope.org/#:~:text=Mechanical%20recycling%20of%20plastics%20refers,chemical%20structure%20of%20the%20material.&text=It%20is%20currently%20the%20almost,99%25%20of%20the%20recycled%20quantities)\n[20mat​erial.​&​text=​It%​20is%​20cur​rently%​20the%​20alm​ost,99%​](https://plasticseurope.org/#:~:text=Mechanical%20recycling%20of%20plastics%20refers,chemical%20structure%20of%20the%20material.&text=It%20is%20currently%20the%20almost,99%25%20of%20the%20recycled%20quantities)\n[25%​20of%​20the%​20rec​ycled%​20qua​ntiti​es.](https://plasticseurope.org/#:~:text=Mechanical%20recycling%20of%20plastics%20refers,chemical%20structure%20of%20the%20material.&text=It%20is%20currently%20the%20almost,99%25%20of%20the%20recycled%20quantities)\nPlastindia Foundation (2018) Report on The Indian Plastics Industry.\n[Retrieved from https://​plast​india.​org/​pdf/​Indian-​Plast​ics-​Indus​](https://plastindia.org/pdf/Indian-Plastics-Industry-Report-2018-2.pdf)\n[try-​Report-​2018-2.​pdf](https://plastindia.org/pdf/Indian-Plastics-Industry-Report-2018-2.pdf)\n\n## 1 3\n\n\n-----\n\nPunjab Pollution Control Board (2018) Annual report 2018. Retrieved\n[from https://​ppcb.​punjab.​gov.​in/​Attac​hments/​Plast​ic%​20Was​te/​](https://ppcb.punjab.gov.in/Attachments/Plastic%20Waste/PlasticCPCB.pdf)\n[Plast​icCPCB.​pdf](https://ppcb.punjab.gov.in/Attachments/Plastic%20Waste/PlasticCPCB.pdf)\n\nRafey A, Siddiqui FZ (2021) A review of PW management in India—\n[challenges and opportunities. Int J Environ Anal Chem. https://​](https://doi.org/10.1080/03067319.2021.1917560)\n[doi.​org/​10.​1080/​03067​319.​2021.​19175​60](https://doi.org/10.1080/03067319.2021.1917560)\n\nRagaert K, Delva L, Van Geem K (2017) Mechanical and chemical\n[recycling of solid PW. Waste Manag 69:24–58. https://​doi.​org/​](https://doi.org/10.1016/j.wasman.2017.07.044)\n[10.​1016/j.​wasman.​2017.​07.​044](https://doi.org/10.1016/j.wasman.2017.07.044)\n\nRokade S (2012) Use of waste plastic and waste rubber tyres in flexible highway pavements. In: International conference on future\nenvironment and energy, IPCBEE, vol 28\nSaebea D, Ruengrit P, Arpornwichanop A, Patcharavorachot Y (2020)\nGasification of PW for synthesis gas production. Energy Rep\n[6:202–207. https://​doi.​org/​10.​1016/j.​egyr.​2019.​08.​043](https://doi.org/10.1016/j.egyr.2019.08.043)\n\nSatapathy S (2017) An analysis of barriers for plastic recycling in the\nIndian plastic industry. Benchmark Int J 24(2):415–430\nSchandl H, King S, Walton A, Kaksonen AH, Tapsuwan S, Baynes\nTM (2020) National circular economy roadmap for plastics, glass,\npaper and tyres. Australia’s National Science Agency, CSIRO,\nAustralia\nSikdar S, Siddaiah A, Menezes PL (2020) Conversion of waste plastic\n[to oils for tribological applications. Lubricants 8(8):78. https://​](https://doi.org/10.3390/lubricants8080078)\n[doi.​org/​10.​3390/​lubri​cants​80800​78](https://doi.org/10.3390/lubricants8080078)\n\nSingh RK, Ruj B (2015) PW management and disposal techniques[Indian scenario. Int J Plast Technol 19(2):211–226. https://​doi.​](https://doi.org/10.1007/s12588-015-9120-5)\n[org/​10.​1007/​s12588-​015-​9120-5](https://doi.org/10.1007/s12588-015-9120-5)\n\nSinghal S, Singhal S, Neha, Jamal M (2021) Recognizing &automating the barriers of plastic waste management – collection and\nsegregation 8(4):775–779\nSolis M, Silveira S (2020) Technologies for chemical recycling of\nhousehold plastics—a technical review and TRL assessment.\n[Waste Manag 105:128–138. https://​doi.​org/​10.​1016/j.​wasman.​](https://doi.org/10.1016/j.wasman.2020.01.038)\n[2020.​01.​038](https://doi.org/10.1016/j.wasman.2020.01.038)\n\nChowdhary S (2021) Biopolymers: smart solution for solving the PW\n[problem. Retrieved from https://​www.​finan​ciale​xpress.​com/​indus​](https://www.financialexpress.com/industry/bio-polymers-smart-solution-for-solving-the-plastic-waste-problem/2267620/)\n[try/​bio-​polym​ers-​smart-​solut​ion-​for-​solvi​ng-​the-​plast​ic-​waste-​](https://www.financialexpress.com/industry/bio-polymers-smart-solution-for-solving-the-plastic-waste-problem/2267620/)\n[probl​em/​22676​20/.](https://www.financialexpress.com/industry/bio-polymers-smart-solution-for-solving-the-plastic-waste-problem/2267620/)\nTamil Nadu Pollution Control Board (2020) Annual report on PW\n[management rules, 2016. Retrieved from https://​tnpcb.​gov.​in/​](https://tnpcb.gov.in/pdf_2019/AnnualRptPlasticwaste1920.pdf)\n[pdf_​2019/​Annua​lRptP​lasti​cwast​e1920.​pdf](https://tnpcb.gov.in/pdf_2019/AnnualRptPlasticwaste1920.pdf)\n\n## 1 3\n\n\nTelangana Pollution Control Board (2018) Annual report 2017–18.\n[Retrieved from https://​tspcb.​cgg.​gov.​in/​CBIPMP/​Plast​ic%​20ann​](https://tspcb.cgg.gov.in/CBIPMP/Plastic%20annual%20returns%202017-18.pdf)\n[ual%​20ret​urns%​202017-​18.​pdf](https://tspcb.cgg.gov.in/CBIPMP/Plastic%20annual%20returns%202017-18.pdf)\n\nTERI (2020) PW management: turning challenges into opportunities.\n[Retrieved from https://​www.​teriin.​org/​sites/​defau​lt/​files/​2020-​12/​](https://www.teriin.org/sites/default/files/2020-12/plastic-management_0.pdf)\n[plast​ic-​manag​ement_0.​pdf](https://www.teriin.org/sites/default/files/2020-12/plastic-management_0.pdf)\n\nTERI (2021) Circular Economy for plastics in India: A Roadmap.\n\n[https://​www.​teriin.​org/​sites/​defau​lt/​files/​2021-​12/​Circu​lar-​Econo​](https://www.teriin.org/sites/default/files/2021-12/Circular-Economy-Plastics-India-Roadmap.pdf)\n[my-​Plast​ics-​India-​Roadm​ap.​pdf](https://www.teriin.org/sites/default/files/2021-12/Circular-Economy-Plastics-India-Roadmap.pdf)\n\nTong Z, Ma G, Zhou D (2020) Simulating continuous counter-current\nleaching process for indirect mineral carbonation under microwave irradiation. J Solid Waste Technol Manag 46(1):123–131.\n[https://​doi.​org/​10.​5276/​JSWTM/​2020.​123](https://doi.org/10.5276/JSWTM/2020.123)\n\nUttar Pradesh Pollution Control Board (2021) Annual report 2019–\n2020. Retrieved from [http://​uppcb.​com/​pdf/​Plast​ic-​Annual_​](http://uppcb.com/pdf/Plastic-Annual_090321.pdf)\n[090321.​pdf](http://uppcb.com/pdf/Plastic-Annual_090321.pdf)\n\nUttarakhand Pollution Control Board (2019) Annual report 2018–2019.\nRetrieved from [https://​ueppcb.​uk.​gov.​in/​files/​annual_​report_​](https://ueppcb.uk.gov.in/files/annual_report_PWM.pdf)\n[PWM.​pdf](https://ueppcb.uk.gov.in/files/annual_report_PWM.pdf)\n\nVolk R, Stallkamp C, Steins JJ, Yogish SP, Müller RC, Stapf D, Schultmann F (2021) Techno-economic assessment and comparison of\ndifferent plastic recycling pathways: a German case study. J Ind\n[Ecol. https://​doi.​org/​10.​1111/​jiec.​13145](https://doi.org/10.1111/jiec.13145)\n\nWBCSD (2017) Informal approaches towards a circular economy—\n[learning from the plastics recycling sector in India. https://​www.​](https://www.sustainable-recycling.org/wp-content/uploads/2017/01/WBCSD_2016_-InformalApproaches.pdf)\n[susta​inable-​recyc​ling.​org/​wp-​conte​nt/​uploa​ds/​2017/​01/​WBCSD_​](https://www.sustainable-recycling.org/wp-content/uploads/2017/01/WBCSD_2016_-InformalApproaches.pdf)\n[2016_-​Infor​malAp​proac​hes.​pdf](https://www.sustainable-recycling.org/wp-content/uploads/2017/01/WBCSD_2016_-InformalApproaches.pdf)\n\nWołosiewicz-Głąb M, Pięta P, Sas S, Grabowski Ł (2017) PW depolymerization as a source of energetic heating oils. In: E3S web of\n[conferences, vol 14. EDP Sciences, p 02044. https://​doi.​org/​10.​](https://doi.org/10.1051/e3sconf/20171402044)\n[1051/​e3sco​nf/​20171​402044](https://doi.org/10.1051/e3sconf/20171402044)\n\nWong S, Yeung JKW, Lau YY, So J (2021) Technical sustainability\nof cloud-based blockchain integrated with machine learning for\n[supply chain management. Sustainability 13(15):8270. https://​doi.​](https://doi.org/10.3390/su13158270)\n[org/​10.​3390/​su131​58270](https://doi.org/10.3390/su13158270)\n\nZhang F, Zhao Y, Wang D, Yan M, Zhang J, Zhang P, Chen C (2021)\nCurrent technologies for PW treatment: a review. J Clean Prod\n[282:124523. https://​doi.​org/​10.​1016/j.​jclep​ro.​2020.​124523](https://doi.org/10.1016/j.jclepro.2020.124523)\n\n\n-----\n\n"
Plastic waste recycling: existing Indian scenario and future opportunities
This review article aims to suggest recycling technological options in India and illustrates plastic recycling clusters and reprocessing infrastructure for plastic waste (PW) recycling in India. The study shows that a majority of states in India are engaged in recycling, road construction, and co-processing in cement kilns while reprocessing capabilities among the reprocessors are highest for polypropylene (PP) and polyethylene (PE) polymer materials. This review suggests that there are key opportunities for mechanical recycling, chemical recycling, waste-to-energy approaches, and bio-based polymers as an alternative to deliver impact to India’s PW problem. On the other hand, overall, polyurethane, nylon, and polyethylene terephthalate appear most competitive for chemical recycling. Compared to conventional fossil fuel energy sources, polyethylene (PE), polypropylene (PP), and polystyrene are the three main polymers with higher calorific values suitable for energy production. Also, multi-sensor-based artificial intelligence and blockchain technology and digitization for PW recycling can prove to be the future for India in the waste flow chain and its management. Overall, for a circular plastic economy in India, there is a necessity for a technology-enabled accountable quality-assured collaborative supply chain of virgin and recycled material.
2022.0
2022-04-02 00:00:00
https://www.semanticscholar.org/paper/000523657fe1a5879d72c099f619ea0de4424bff
International Journal of Environmental Science and Technology
True
000548b90449dad8f1aaa3207fa6b77503c1d2a3
"# sensors\n\n_Article_\n## A Distributed and Secure Self-Sovereign-Based Framework for Systems of S(...TRUNCATED)
A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems
"Security and privacy are among the main challenges in the systems of systems. The distributed ledge(...TRUNCATED)
2023.0
2023-09-01 00:00:00
https://www.semanticscholar.org/paper/000548b90449dad8f1aaa3207fa6b77503c1d2a3
Italian National Conference on Sensors
True
000634d00e45d43a7abbc57c02bea6d663cb9232
"http://www.biomedcentral.com/1471 2105/12/85\n\n## SOFTWARE Open Access\n\n# DecGPU: distributed er(...TRUNCATED)
"DecGPU: distributed error correction on massively parallel graphics processing units using CUDA and(...TRUNCATED)
"BackgroundNext-generation sequencing technologies have led to the high-throughput production of seq(...TRUNCATED)
2011.0
2011-03-29 00:00:00
https://www.semanticscholar.org/paper/000634d00e45d43a7abbc57c02bea6d663cb9232
BMC Bioinformatics
True
000c351ffff4b7379817bf6a9c73c4d3617a1395
"# sensors\n\n_Article_\n### A Proof of Concept of a Mobile Health Application to Support Profession(...TRUNCATED)
"A Proof of Concept of a Mobile Health Application to Support Professionals in a Portuguese Nursing (...TRUNCATED)
"Over the past few years, the rapidly aging population has been posing several challenges to healthc(...TRUNCATED)
2019.0
2019-09-01 00:00:00
https://www.semanticscholar.org/paper/000c351ffff4b7379817bf6a9c73c4d3617a1395
Italian National Conference on Sensors
True
0010110e322b5ed622e9a57ff2aed1b092b3cf9e
"## sustainability\n\n_Article_\n# An Attribute-Based Access Control for IoT Using Blockchain and Sm(...TRUNCATED)
An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts
"With opportunities brought by the Internet of Things (IoT), it is quite a challenge to maintain con(...TRUNCATED)
2021.0
2021-09-23 00:00:00
https://www.semanticscholar.org/paper/0010110e322b5ed622e9a57ff2aed1b092b3cf9e
Sustainability
True
00112bc246d0ad07bf4c6ce0c2ec39f30c3015ca
"Hindawi\nInternational Journal of Genomics\nVolume 2021, Article ID 3102399, 14 pages\n[https://doi(...TRUNCATED)
"Genome-Wide Analysis of the Auxin/Indoleacetic Acid Gene Family and Response to Indole-3-Acetic Aci(...TRUNCATED)
"Auxin/indoleacetic acid (Aux/IAA) family genes respond to the hormone auxin, which have been implic(...TRUNCATED)
2021.0
2021-10-26 00:00:00
https://www.semanticscholar.org/paper/00112bc246d0ad07bf4c6ce0c2ec39f30c3015ca
International Journal of Genomics
True
00159a43bf50d7133c490a38339afdd626c5a975
"Received August 18, 2020, accepted August 31, 2020, date of publication September 3, 2020, date of (...TRUNCATED)
HPBS: A Hybrid Proxy Based Authentication Scheme in VANETs
"As a part of intelligent transportation, vehicle ad hoc networks (VANETs) have attracted the attent(...TRUNCATED)
2020.0
NaT
https://www.semanticscholar.org/paper/00159a43bf50d7133c490a38339afdd626c5a975
IEEE Access
True
00183d0d30904451be10a8ec7ceb6edf4a8f3637
"# Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes(...TRUNCATED)
Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes
2013.0
NaT
https://www.semanticscholar.org/paper/00183d0d30904451be10a8ec7ceb6edf4a8f3637
IEEE Transactions on Information Forensics and Security
True
End of preview. Expand in Data Studio

DLT-Scientific-Literature

Paper | GitHub

Dataset Description

Dataset Summary

DLT-Scientific-Literature is a specialized corpus of academic publications focused on Distributed Ledger Technology (DLT). This dataset is part of the larger DLT-Corpus collection, designed to support NLP research, language model development, and innovation studies in the DLT domain.

The dataset contains 37,440 scientific documents with 564 million tokens, spanning publications from 1978 to 2025. All documents are in English and have been filtered for domain relevance using a fine-tuned BERT model.

This dataset is part of the DLT-Corpus collection. For the complete corpus including patents and social media data, see: https://huggingface.co/collections/ExponentialScience/dlt-corpus-68e44e40d4e7a3bd7a224402

Languages

English (en)

Dataset Structure

Data Fields

The dataset includes the following fields for each document:

  • paperId: Unique identifier from Semantic Scholar
  • title: Title of the scientific publication
  • authors: List of authors
  • year: Publication year
  • publicationDate: Full publication date
  • venue: Publication venue (journal, conference, etc.)
  • publicationVenue: Detailed venue information
  • publicationTypes: Type of publication (e.g., JournalArticle, Conference)
  • abstract: Abstract of the publication
  • text: Full text content in Markdown format
  • url: URL to the source document
  • openAccessPdf: Link to open access PDF if available
  • isOpenAccess: Boolean indicating open access status
  • fieldsOfStudy: Academic fields associated with the paper
  • s2FieldsOfStudy: Semantic Scholar's field classifications
  • references: List of referenced papers
  • lang: Language code
  • lang_conf: Confidence score for language detection
  • tok_len: Token length of the document
  • total_tokens: Total number of tokens

Data Splits

This is a single corpus without predefined splits. Users should create their own train/validation/test splits based on their specific research needs.

Dataset Creation

Curation Rationale

DLT-Scientific-Literature was created to address the lack of large-scale, domain-specific text corpora for NLP and computational research in the Distributed Ledger Technology field. The dataset enables researchers to:

  • Develop DLT-specific language models and embeddings
  • Conduct innovation studies and trend analysis
  • Perform text mining on cutting-edge DLT research
  • Study the evolution of concepts and terminology in the field

Source Data

Data Collection

Scientific literature was collected from the Semantic Scholar API using domain-specific queries related to blockchain, distributed ledgers, cryptocurrencies, smart contracts, and related technologies.

Data Processing

The collection process involved:

  1. Query-based retrieval: Using targeted keywords to retrieve relevant publications
  2. PDF parsing: Converting PDF documents to Markdown format
  3. Language detection: Filtering for English-language documents
  4. Length filtering: Removing documents that are too short or too long
  5. Domain relevance filtering: Using a fine-tuned BERT model to ensure documents are relevant to DLT

Personal and Sensitive Information

This dataset contains only publicly available scientific literature. No personal or confidential data is included. Author names and affiliations are retained as they appear in the original publications, as this is standard academic practice.

Considerations for Using the Data

Discussion of Biases

Potential biases include:

  • Geographic bias: Publications may be skewed toward institutions in certain countries
  • Language bias: Only English-language publications are included
  • Temporal bias: More recent years may have disproportionately more publications
  • Venue bias: Certain journals or conferences may be over-represented
  • Citation bias: Highly-cited papers may be more likely to be included

Other Known Limitations

  • Temporal coverage: While the dataset spans 1978-2025, the distribution is uneven with more recent years heavily represented
  • Access limitations: Some publications may be missing due to access restrictions or API limitations
  • Quality variation: Academic writing quality and rigor vary across publications
  • Parsing errors: PDF-to-Markdown conversion may introduce formatting issues in some documents

Additional Information

Dataset Curators

Walter Hernandez Cruz, Peter Devine, Nikhil Vadgama, Paolo Tasca, Jiahua Xu

Licensing Information

Mixed open-access licenses including:

  • Creative Commons Attribution (CC-BY)
  • Creative Commons Attribution-ShareAlike (CC-BY-SA)
  • Creative Commons Zero (CC0)
  • Other permissive open-access licenses

Individual license information is included in the metadata for each document where available. Users should check the specific license for each document before use.

Citation Information

@misc{hernandez2026dlt-corpus,
      title={DLT-Corpus: A Large-Scale Text Collection for the Distributed Ledger Technology Domain}, 
      author={Walter Hernandez Cruz and Peter Devine and Nikhil Vadgama and Paolo Tasca and Jiahua Xu},
      year={2026},
      eprint={2602.22045},
      archivePrefix={arXiv},
      primaryClass={cs.CL},
      url={https://arxiv.org/abs/2602.22045}, 
}
Downloads last month
34

Models trained or fine-tuned on ExponentialScience/DLT-Scientific-Literature

Collection including ExponentialScience/DLT-Scientific-Literature

Paper for ExponentialScience/DLT-Scientific-Literature