{"id":"https://openalex.org/W4228998112","doi":"https://doi.org/10.1109/percomworkshops53856.2022.9767382","title":"A Conflict-Free Redactable Blockchain","display_name":"A Conflict-Free Redactable Blockchain","publication_year":2022,"publication_date":"2022-03-21","ids":{"openalex":"https://openalex.org/W4228998112","doi":"https://doi.org/10.1109/percomworkshops53856.2022.9767382"},"language":"en","primary_location":{"id":"doi:10.1109/percomworkshops53856.2022.9767382","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percomworkshops53856.2022.9767382","pdf_url":null,"source":{"id":"https://openalex.org/S4363608020","display_name":"2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046431316","display_name":"Xianning Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianning Meng","raw_affiliation_strings":["University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073234532","display_name":"Peifang Ni","orcid":"https://orcid.org/0000-0003-3656-7431"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peifang Ni","raw_affiliation_strings":["University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102003431","display_name":"Hongda Li","orcid":"https://orcid.org/0000-0001-5589-4759"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongda Li","raw_affiliation_strings":["University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070096066","display_name":"Haixian Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haixian Xu","raw_affiliation_strings":["University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, CAS School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046431316"],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04915893,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2017","issue":null,"first_page":"285","last_page":"290"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9620000123977661,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.946269154548645},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7783636450767517},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6975269913673401},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5778390169143677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5339898467063904},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5230720639228821},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.48976564407348633},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45271456241607666},{"id":"https://openalex.org/keywords/proof-of-work-system","display_name":"Proof-of-work system","score":0.4469680190086365},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.42690059542655945},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4213804602622986},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35545408725738525},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16925913095474243},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13205412030220032},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09751001000404358}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.946269154548645},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7783636450767517},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6975269913673401},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5778390169143677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5339898467063904},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5230720639228821},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.48976564407348633},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45271456241607666},{"id":"https://openalex.org/C123436394","wikidata":"https://www.wikidata.org/wiki/Q7249984","display_name":"Proof-of-work system","level":3,"score":0.4469680190086365},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42690059542655945},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4213804602622986},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35545408725738525},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16925913095474243},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13205412030220032},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09751001000404358},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/percomworkshops53856.2022.9767382","is_oa":false,"landing_page_url":"https://doi.org/10.1109/percomworkshops53856.2022.9767382","pdf_url":null,"source":{"id":"https://openalex.org/S4363608020","display_name":"2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2571698069","https://openalex.org/W2592077777","https://openalex.org/W2611626082","https://openalex.org/W2613387059","https://openalex.org/W2724185994","https://openalex.org/W2790401422","https://openalex.org/W2910702660","https://openalex.org/W2914554654","https://openalex.org/W2948007978","https://openalex.org/W2950768111","https://openalex.org/W3098957467","https://openalex.org/W3208374658","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6772400047"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2981481350"],"abstract_inverted_index":{"To":[0],"cope":[1],"with":[2],"the":[3,11,17,22,31,42,49,53,90,98,102,105,111,115,118,146],"challenges":[4],"that":[5,37,78],"posed":[6],"by":[7],"illegal":[8],"data":[9],"on":[10,128],"immutable":[12],"blockchain,":[13,119],"and":[14,100,132],"to":[15,40,70,88],"meet":[16],"requirements":[18],"of":[19,30,44,92,97,104,117,130,134],"privacy":[20],"regulations,":[21],"redactable":[23,33,75],"blockchains":[24],"are":[25],"proposed.":[26],"The":[27],"biggest":[28],"shortcoming":[29],"state-of-the-art":[32],"blockchain":[34,76,125],"protocols":[35],"is":[36],"they":[38],"fail":[39],"consider":[41],"appearance":[43],"multiple":[45,56],"conflicting":[46,57],"redactions":[47],"at":[48,149],"same":[50],"time.":[51],"When":[52],"protocol":[54,77],"faces":[55],"requests":[58,80],"for":[59,85],"a":[60,74,82,141,150],"specific":[61],"block":[62],"submitted":[63],"almost":[64],"simultaneously,":[65],"their":[66],"method":[67],"will":[68],"lead":[69],"conflicts.We":[71],"put":[72],"forward":[73],"packages":[79],"into":[81],"conflict-free":[83],"set":[84],"vote-based":[86],"consensus":[87],"eliminate":[89],"possibility":[91],"two":[93],"different":[94],"edited":[95,147],"versions":[96],"chain":[99],"ensure":[101],"consistency":[103],"system.":[106],"Moreover,":[107],"our":[108,137],"protocol,":[109,138],"unbinding":[110],"redaction":[112],"processing":[113],"from":[114],"extension":[116],"can":[120],"be":[121],"easily":[122],"integrable":[123],"in":[124],"systems":[126],"based":[127],"proof":[129,133],"work":[131],"stake.":[135],"Furthermore,":[136],"resisting":[139],"against":[140],"fully":[142],"adaptive":[143],"adversary,":[144],"confirms":[145],"blocks":[148],"constant":[151],"rate.":[152]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
