Constraints-based and One-time Modification Redactable Blockchain

被引:0
|
作者
Wang, Chunli [1 ]
Chen, Yuling [1 ]
Jia, Wensheng [1 ]
机构
[1] Guizhou Univ, Coll Math & Stat, Guiyang, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2023年 / 24卷 / 07期
关键词
Chameleon hash; Redactable; Blockchain rewriting; SUPPLY CHAIN; SYSTEM;
D O I
10.53106/160792642023122407005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Immutability enables the blockchain to store data permanently, which is considered to be the most essential property to protect the security of blockchain technology. However, illegal content stored on the blockchain cannot be modified either. "The right to be forgotten" stipulates that the data subject has the right to request the data controller to delete personal data about him, and the controller is obliged to delete the personal data in a timely manner in such circumstances. Therefore, redactable blockchains are proposed to solve the aforementioned problems. The redactable blockchain relaxes the immutability of blockchains in a controlled manner. However, a participant who is granted the privilege to modify the blockchain, he/she may add inappropriate or malicious modifications to the content of historical blocks. In this article, we introduce a redactable blockchain where transaction owners restrict what editors can rewrite in transactions. When posting an editable transaction, the transaction owner indicates what can be edited and what cannot be edited in order to restrict a transaction modifier from making malicious changes to the content of the transaction. The modifier's changes to the transaction are then validated by the validator and any malicious changes that do not meet the requirements will fail to be validated. To counteract collusive attacks between modifiers and validators, they will be held accountable and penalized.
引用
收藏
页码:1437 / 1446
页数:10
相关论文
共 50 条
  • [1] One-Time Chameleon Hash Function and Its Application in Redactable Blockchain
    Gao W.
    Chen L.
    Tang C.
    Zhang G.
    Li F.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2310 - 2318
  • [2] A Blockchain-Based Authentication Method with One-Time Password
    Zhang, Mingli
    Wang, Liming
    Yang, Jing
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [3] One-Time Anonymous Certificateless Signcryption Scheme Based on Blockchain
    Jin, Yan
    Ye, Chunxiao
    Yang, Mengqing
    Ye, Chunming
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2022, PT I, 2022, 460 : 533 - 551
  • [4] A New One-time Address Scheme for Blockchain
    Luo, Yili
    Wang, Zhen
    Fan, Jia
    Li, Yarong
    Bai, Jian
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 268 - 272
  • [5] On one-time cookies protocol based on one-time password
    Junhui He
    Dezhi Han
    Kuan-Ching Li
    Soft Computing, 2020, 24 : 5657 - 5670
  • [6] On one-time cookies protocol based on one-time password
    He, Junhui
    Han, Dezhi
    Li, Kuan-Ching
    SOFT COMPUTING, 2020, 24 (08) : 5657 - 5670
  • [7] A DELEGATION MODEL FOR TIME CONSTRAINTS-BASED TRBAC
    Zhang, Dong-Wen
    Pei, Xing
    Qiu, Ji-Qing
    Zhang, Yang
    Peng, Jing
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2027 - +
  • [8] SEREDACT: Secure and Efficient Redactable Blockchain with Verifiable Modification
    Xu, Zhuo
    Luo, Xinyi
    Xue, Kaiping
    Wei, David
    Li, Ruidong
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 818 - 828
  • [9] One-Time Involutory Matrix-Based Hill Cipher Modification
    Chefranov, Alexander
    Dukhnich, Evgeny
    Shapel, Alexander
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2020, 15 (04): : 165 - 174
  • [10] Redactable Blockchain with K -Time Controllable Editing
    Li, Yong
    Zhang, Zhenghao
    Chen, Xi
    Li, Ruxian
    Zhang, Liang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1455 - 1461