Constraints-based and One-time Modification Redactable Blockchain

被引:0
|
作者
Wang, Chunli [1 ]
Chen, Yuling [1 ]
Jia, Wensheng [1 ]
机构
[1] Guizhou Univ, Coll Math & Stat, Guiyang, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2023年 / 24卷 / 07期
关键词
Chameleon hash; Redactable; Blockchain rewriting; SUPPLY CHAIN; SYSTEM;
D O I
10.53106/160792642023122407005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Immutability enables the blockchain to store data permanently, which is considered to be the most essential property to protect the security of blockchain technology. However, illegal content stored on the blockchain cannot be modified either. "The right to be forgotten" stipulates that the data subject has the right to request the data controller to delete personal data about him, and the controller is obliged to delete the personal data in a timely manner in such circumstances. Therefore, redactable blockchains are proposed to solve the aforementioned problems. The redactable blockchain relaxes the immutability of blockchains in a controlled manner. However, a participant who is granted the privilege to modify the blockchain, he/she may add inappropriate or malicious modifications to the content of historical blocks. In this article, we introduce a redactable blockchain where transaction owners restrict what editors can rewrite in transactions. When posting an editable transaction, the transaction owner indicates what can be edited and what cannot be edited in order to restrict a transaction modifier from making malicious changes to the content of the transaction. The modifier's changes to the transaction are then validated by the validator and any malicious changes that do not meet the requirements will fail to be validated. To counteract collusive attacks between modifiers and validators, they will be held accountable and penalized.
引用
收藏
页码:1437 / 1446
页数:10
相关论文
共 50 条
  • [21] Maintainable verifiable data streaming based on redactable blockchain
    Miao, Meixia
    Wang, Mengchen
    Zhao, Siqi
    Zhang, Fangguo
    Wei, Jianghong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [22] K-time Redactable Blockchain with Decentralized History Rewriting
    Liu, Quan
    Shen, Jun
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 41 - 49
  • [23] Authentication Protocols Based on One-Time Passwords
    Babkin, Sergey
    Epishkina, Anna
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 1794 - 1798
  • [24] One-time setup
    Schafer, Christiane
    MUSIK UND KIRCHE, 2024, 94 (01): : 19 - 19
  • [25] 'One-time use'
    Allen, RD
    HUDSON REVIEW, 2005, 58 (01): : 68 - 68
  • [26] The One-Time Monster
    Bazzett, Michael
    NORTH AMERICAN REVIEW, 2015, 300 (01): : 24 - 24
  • [27] 'ONE-TIME SERVANT'
    FERNANDO, B
    JOURNAL OF SOUTH ASIAN LITERATURE, 1976, 12 (1-2) : 19 - 19
  • [28] One-time programs
    Goldwasser, Shafi
    Kalai, Yael Tauman
    Rothblum, Guy N.
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 39 - +
  • [29] Dynamic Group Time-Based One-Time Passwords
    Cao, Xuelian
    Yang, Zheng
    Ning, Jianting
    Jin, Chenglu
    Lu, Rongxing
    Liu, Zhiming
    Zhou, Jianying
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4897 - 4913
  • [30] Building Traceable Redactable Blockchain with Time-Verifiable Chameleon Hash
    Chen, Mingliang
    Xie, Guoqiang
    Pan, Benren
    Fang, Jinyan
    Xu, Zaide
    Zhao, Zhen
    ELECTRONICS, 2025, 14 (05):