Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption

被引:0
|
作者
Dong, Yueyan [1 ]
Li, Yifang [1 ]
Cheng, Ye [1 ]
Yu, Dongxiao [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Peoples R China
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 01期
关键词
Regulation; Chameleon hash; Redactable blockchain; Consortium blockchain;
D O I
10.1016/j.hcc.2023.100168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information. Access control is a mechanism that limits data visibility and ensures that only authorized users can decrypt and access encrypted information, playing a crucial role in addressing privacy concerns and securing the data stored on a blockchain. Redactability and access control are both essential components when implementing a regulated consortium blockchain in real-world situations to ensure the secure sharing of data while removing undesirable content. We propose a decentralized consortium blockchain system prototype that supports redactability and access control. Through the development of a prototype blockchain system, we investigate the feasibility of combining these approaches and demonstrate that it is possible to implement a redactable blockchain with access control in a consortium blockchain setting. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    [J]. DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [2] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    [J]. CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [3] Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage
    Challagidad, Praveen S.
    Birje, Mahantesh N.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 840 - 849
  • [4] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    [J]. 2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [5] Attribute-Based Data Access Control for Multi-Authority System
    Salehi, Ahmad S.
    Rudolph, Carsten
    Grobler, Marthie
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1834 - 1841
  • [6] Multi-Authority Attribute-Based Access Control with Smart Contract
    Guo, Hao
    Meamari, Ehsan
    Shen, Chien-Chung
    [J]. 2019 INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2019), 2019, : 6 - 11
  • [7] A survey on multi-authority and decentralized attribute-based encryption
    Prince Silas Kwesi Oberko
    Victor-Hillary Kofi Setornyo Obeng
    Hu Xiong
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 515 - 533
  • [8] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    [J]. Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91
  • [9] A survey on multi-authority and decentralized attribute-based encryption
    Oberko, Prince Silas Kwesi
    Obeng, Victor-Hillary Kofi Setornyo
    Xiong, Hu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 515 - 533
  • [10] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    [J]. SOFT COMPUTING, 2018, 22 (01) : 243 - 251