Electronic document authenticity verification of diploma and transcript using smart contract on Ethereum blockchain


  • Nero Chaniago Telkom University, Bandung
  • Parman Sukarno Telkom University, Bandung
  • Aulia Arif Wardana Telkom University, Bandung




authentication, diplomas, public blockchain, Smart Contract ERC-721, transcript


Ethereum is one of the oldest examples of blockchain technology provides a system that converts centralized storage to distributed and records transactions by way of decentralized and not by a centralized system and can be verified by each node, therefore it is suitable for storing fingerprints from official diploma documents and transcripts that are published. Smart contract is needed for making contract transactions to Ethereum with programming code, so contracts such as diplomas and transcripts uploaded on the Ethereum blockchain can distribute and produce diploma validation and the authenticity of transcripts with transaction hash, consensus, and comply with ERC-721 token standardization. The results showed that a sample of 5 electronic documents in pdf format with a transaction speed of 1 second on each file that were published and secured with Ethereum blockchain technology can be easily verified for authenticity, the system proposed and developed by us takes in consideration invalid and failure cases by giving the necessary feedback to the user.

Author Biographies

Nero Chaniago, Telkom University, Bandung

Department of Informatics

Parman Sukarno, Telkom University, Bandung

Department of Informatics

Aulia Arif Wardana, Telkom University, Bandung

Department of Informatics


[1] T. Kanan, A. T. Obaidat and M. Al-Lahham, "SmartCert BlockChain Imperative for Educational Certificates," in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 2019.

[2] J.-C. Cheng, N.-Y. Lee, C. Chi and Y.-H. Chen, "Blockchain and smart contract for digital certificate," in 2018 IEEE International Conference on Applied System Invention (ICASI), Chiba, Japan, 2018.

[3] R. Gupta, Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain, Birmingham, UK: Packt, 2018.

[4] A. K. Shrivastava, C. Vashistth, A. Rajak and A. K. Tripathi, "A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain," in 2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), Ghaziabad, India, 2019.

[5] J. Fat, H. Candra and W. William, "Sekuritisasi Data Sensor pada Aplikasi Internet of Things (IoT) dengan Menggunakan Blockchain Ethereum di Jaringan Testnet," TESLA, vol. 21, no. 1, pp. 79-86, 2019.

[6] A. Shahnaz, U. Qamar and A. Khalid, "Using Blockchain for Electronic Health Records," IEEE Access, vol. 7, pp. 147782-147795, 2019.

[7] K. D. Kumar, P. Senthil and M. K. D.S, "Educational Certificate Verification System Using Blockchain," International Journal of Scientific & Technology Research, vol. 9, no. 3, 2020.

[8] I. Yunelia, "Laporan Peredaran Ijazah 'Aspal' di Tahun Politik Meningkat," Medcom, 26 August 2019. [Online]. Available: https://www.medcom.id/pendidikan/news-pendidikan/1bVydZ2N-laporan-peredaran-ijazah-aspal-di-tahun-politik-meningkat.

[9] N. Kumavat, S. Mengade, D. Desai and J. Varolia, "Certificate verification system using blockchain," Int. J. Res. Appl. Sci. Eng. Technol. (IJRASET), vol. 7, no. IV, p. 53–57, 2019.

[10] B. Triand, S. Effendi, R. Puspasari, I. F. Rahmad and E. Ekadiansyah, "Digital Document Security on Legalize Higher Education Diplomas with Digital Signature and SHA-1 Algorithm," in 2019 7th International Conference on Cyber and IT Service Management (CITSM), Jakarta, Indonesia, 2019.

[11] W. Cai, Z. Wang, J. B. Ernst, Z. Hong, C. Feng and V. C. M. Leung, "Decentralized Applications: The Blockchain-Empowered Software System," IEEE Access, vol. 6, pp. 53019-53033, 2018.

[12] E. Karataş, "Developing Ethereum Blockchain-Based Document Verification Smart Contract for Moodle Learning Management System," Bilişim Teknolojileri Dergisi, vol. 11, no. 4, pp. 399-406, 2018.

[13] P. A. W. Putro, "Physical document validation with perceptual hash," in 2017 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia, 2017.

[14] M. A. Sadikin and R. W. Wardhani, "Implementation of RSA 2048-bit and AES 256-bit with digital signature for secure electronic health record application," in 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), Lombok, Indonesia, 2016.

[15] S. S. Kumari and D. Saveetha, "Blockchain and Smart Contract for Digital Document Verification," International Journal of Engineering & Technology, vol. 7, no. 4.6, pp. 394-397, 2018.

[16] M. Crosby, N. Nachiappan, P. Pattanayak, S. Verma and V. Kalyanaraman, "BlockChain Technology: Beyond Bitcoin," Applied Innovation Review, vol. 2, pp. 6-19, 2016.

[17] A. D. Yulianto, P. Sukarno, A. A. Warrdana and M. A. Makky, "Mitigation of Cryptojacking Attacks Using Taint Analysis," in 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 2019.

[18] M. Wohrer and U. Zdun, "Smart contracts: security patterns in the ethereum ecosystem and solidity," in 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), Campobasso, Italy, 2018.

[19] A. Bogner, M. Chanson and A. Meeuw, "A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain," in 6th International Conference on the Internet of Things (IoT‘16), Stuttgart, Germany, 2016.

[20] Y. Zhang, S. Kasahara, Y. Shen, X. Jiang and J. Wan, "Smart Contract-Based Access Control for the Internet of Things," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594-1605, 2019.

[21] N. Fotiou, I. Pittaras, V. A. Siris, S. Voulgaris and G. C. Polyzos, "OAuth 2.0 authorization using blockchain-based tokens," in Proc. Workshop Decentralized IoT Syst. Secur. (DISS) Conjunct Netw. Distrib. Syst. Secur. Symp. (NDSS), San Diego, CA, USA, 2020.

[22] C. Lin, D. He, N. Kumar, X. Huang, P. Vijayakumar and K. R. Choo, "HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes," IEEE Internet of Things Journal, vol. 7, no. 2, pp. 818-829, 2020.

[23] R. Shrestha and S. Y. Nam, "Regional Blockchain for Vehicular Networks to Prevent 51% Attacks," IEEE Access, vol. 7, pp. 95033-95045, 2019.

[24] S. Sayeed, H. Marco-Gisbert and T. Caira, "Smart Contract: Attacks and Protections," IEEE Access, vol. 8, pp. 24416-24427, 2020.

[25] S. R. Niya, F. Schüpfer, T. Bocek and B. Stiller, "A Peer-to-peer Purchase and Rental Smart Contract-based Application (PuRSCA)," it - Information Technology, vol. 60, no. 5-6, pp. 307-320, 2018.

[26] Q. Xu, Z. He, Z. Li, M. Xiao, R. S. M. Goh and Y. Li, "Chapter 8 - An effective blockchain-based, decentralized application for smart building system management," in Real-Time Data Analytics for Large Scale Sensor Data, vol. 6, H. Das, N. Dey and V. E. Balas, Eds., Academic Press, 2020, pp. 157-181.

[27] M. Conti, N. Dragoni and V. Lesyk, "A Survey of Man In The Middle Attacks," IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2027-2051, 2016.

[28] G. Oliva, S. Cioabă and C. N. Hadjicostis, "Distributed Calculation of Edge-Disjoint Spanning Trees for Robustifying Distributed Algorithms Against Man-in-the-Middle Attacks," IEEE Transactions on Control of Network Systems, vol. 5, no. 4, pp. 1646-1656, 2018.

[29] F. Ahmad, F. Kurugollu, A. Adnane, R. Hussain and F. Hussai, "MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3310-3322, 2020.

[30] R. Roshdy, M. Fouad and M. Aboul-Dahab, "Design and Implementation a New Security Hash Algorithm Based on MD5 and SHA-256," International Journal of Engineering Sciences & Emerging Technologies, vol. 6, no. 1, pp. 29-36, 2013.

[31] M. S. Ali, M. Vecchio, M. Pincheira, K. Dolui, F. Antonelli and M. H. Rehmani, "Applications of Blockchains in the Internet of Things: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1676-171, 2019.

[32] Y. Hu, A. Manzoor, P. Ekparinya, M. Liyanage, K. Thilakarathna, G. Jourjon and A. Seneviratne, "A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain," IEEE Access, vol. 7, pp. 33159-33172, 2019.

[33] S. Guo, Y. Dai, S. Guo, X. Qiu and F. Qi, "Blockchain Meets Edge Computing: Stackelberg Game and Double Auction Based Task Offloading for Mobile Blockchain," IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 5549-5561, 2020.

[34] M. C. I. Putri, P. Sukarno and A. A. Wardana, "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application," Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 6, no. 2, pp. 74-85, 2020.