Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption

被引:0
|
作者
Dong, Yueyan [1 ]
Li, Yifang [1 ]
Cheng, Ye [1 ]
Yu, Dongxiao [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266237, Peoples R China
来源
HIGH-CONFIDENCE COMPUTING | 2024年 / 4卷 / 01期
关键词
Regulation; Chameleon hash; Redactable blockchain; Consortium blockchain;
D O I
10.1016/j.hcc.2023.100168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information. Access control is a mechanism that limits data visibility and ensures that only authorized users can decrypt and access encrypted information, playing a crucial role in addressing privacy concerns and securing the data stored on a blockchain. Redactability and access control are both essential components when implementing a regulated consortium blockchain in real-world situations to ensure the secure sharing of data while removing undesirable content. We propose a decentralized consortium blockchain system prototype that supports redactability and access control. Through the development of a prototype blockchain system, we investigate the feasibility of combining these approaches and demonstrate that it is possible to implement a redactable blockchain with access control in a consortium blockchain setting. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [31] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [32] A blockchain-enabled decentralized access control scheme using multi-authority attribute-based encryption for edge-assisted Internet of Things
    Cheng, Hanlei
    Lo, Sio-Long
    Lu, Jing
    INTERNET OF THINGS, 2024, 26
  • [33] Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
    Pradhan, Ankit
    Sethi, Kamalakanta
    Mohapatra, Shrohan
    Bera, Padmalochan
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 434 - 456
  • [34] Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE
    Zhang, Zongyang
    Li, Tong
    Wang, Zhuo
    Liu, Jianwei
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 408 - 429
  • [35] Blockchain-Based Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme with Equality Test
    Yang X.-D.
    Chen A.-J.
    Wang Z.-S.
    Liao Z.-F.
    Wang C.-F.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2024, 52 (03): : 898 - 908
  • [36] Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
    Nomura, Kenta
    Mohri, Masami
    Shiraishi, Yoshiaki
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10) : 2420 - 2431
  • [37] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Zhang, Xiaohong
    Du, Wenqi
    Moshayedi, Ata Jahangir
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14743 - 14779
  • [38] A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain
    Xiaohong Zhang
    Wenqi Du
    Ata Jahangir Moshayedi
    The Journal of Supercomputing, 2023, 79 : 14743 - 14779
  • [39] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [40] Decentralizing Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy
    Zhang, Leyou
    Ren, Juan
    Kang, Li
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (04) : 588 - 603