Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption

被引:0
|
作者
Dong, Yueyan [1 ]
Li, Yifang [1 ]
Cheng, Ye [1 ]
Yu, Dongxiao [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Peoples R China
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 01期
关键词
Regulation; Chameleon hash; Redactable blockchain; Consortium blockchain;
D O I
10.1016/j.hcc.2023.100168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information. Access control is a mechanism that limits data visibility and ensures that only authorized users can decrypt and access encrypted information, playing a crucial role in addressing privacy concerns and securing the data stored on a blockchain. Redactability and access control are both essential components when implementing a regulated consortium blockchain in real-world situations to ensure the secure sharing of data while removing undesirable content. We propose a decentralized consortium blockchain system prototype that supports redactability and access control. Through the development of a prototype blockchain system, we investigate the feasibility of combining these approaches and demonstrate that it is possible to implement a redactable blockchain with access control in a consortium blockchain setting. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [21] Multi-Authority Attribute-Based Encryption Scheme from Lattices
    Zhang, Guoyan
    Qin, Jing
    Qazi, Shams
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 483 - 501
  • [22] Redactable consortium blockchain based on verifiable distributed chameleon hash functions
    Wu, Xiangyu
    Du, Xuehui
    Yang, Qiantao
    Wang, Na
    Wang, Wenjuan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 183
  • [23] Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices
    Kuchta, Veronika
    Markowitch, Olivier
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 409 - 435
  • [24] Multi-authority attribute-based encryption with honest-but-curious central authority
    Bozovic, Vladimir
    Socek, Daniel
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) : 268 - 283
  • [25] Accountable multi-authority attribute-based data access control in smart grids
    Zhang, Leyou
    Yang, Guang
    Song, Chao
    Wu, Qing
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (07)
  • [26] Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
    Xu, Jie
    Wen, Qiaoyan
    Li, Wenmin
    Shen, Jian
    He, Debiao
    SOFT COMPUTING, 2017, 21 (18) : 5265 - 5279
  • [27] Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
    Jie Xu
    Qiaoyan Wen
    Wenmin Li
    Jian Shen
    Debiao He
    Soft Computing, 2017, 21 : 5265 - 5279
  • [28] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [29] Multi-authority attribute based encryption
    Chase, Melissa
    Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [30] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228