{"id":"https://openalex.org/W4389331827","doi":"https://doi.org/10.1109/tdsc.2023.3339675","title":"IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting","display_name":"IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting","publication_year":2023,"publication_date":"2023-12-05","ids":{"openalex":"https://openalex.org/W4389331827","doi":"https://doi.org/10.1109/tdsc.2023.3339675"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3339675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3339675","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104727679","display_name":"Shun Hu","orcid":"https://orcid.org/0009-0003-2282-3526"},"institutions":[{"id":"https://openalex.org/I1282113950","display_name":"United States Department of Homeland Security","ror":"https://ror.org/00jyr0d86","country_code":"US","type":"funder","lineage":["https://openalex.org/I1282113950"]},{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Shun Hu","raw_affiliation_strings":["College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I1282113950"]},{"raw_affiliation_string":"College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100351377","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-0874-5010"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I1282113950","display_name":"United States Department of Homeland Security","ror":"https://ror.org/00jyr0d86","country_code":"US","type":"funder","lineage":["https://openalex.org/I1282113950"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I1282113950"]},{"raw_affiliation_string":"College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025556550","display_name":"Jiasi Weng","orcid":"https://orcid.org/0000-0002-5876-7875"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I1282113950","display_name":"United States Department of Homeland Security","ror":"https://ror.org/00jyr0d86","country_code":"US","type":"funder","lineage":["https://openalex.org/I1282113950"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Jiasi Weng","raw_affiliation_strings":["College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I1282113950"]},{"raw_affiliation_string":"College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000372510","display_name":"Jia-Nan Liu","orcid":"https://orcid.org/0000-0003-3140-2320"},"institutions":[{"id":"https://openalex.org/I2799850029","display_name":"Dongguan University of Technology","ror":"https://ror.org/01m8p7q42","country_code":"CN","type":"education","lineage":["https://openalex.org/I2799850029"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia-Nan Liu","raw_affiliation_strings":["School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China","institution_ids":["https://openalex.org/I2799850029"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I1282113950","display_name":"United States Department of Homeland Security","ror":"https://ror.org/00jyr0d86","country_code":"US","type":"funder","lineage":["https://openalex.org/I1282113950"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I1282113950"]},{"raw_affiliation_string":"College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5104728624","display_name":"Zhi Li","orcid":"https://orcid.org/0009-0007-1571-4267"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]},{"id":"https://openalex.org/I1282113950","display_name":"United States Department of Homeland Security","ror":"https://ror.org/00jyr0d86","country_code":"US","type":"funder","lineage":["https://openalex.org/I1282113950"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Zhi Li","raw_affiliation_strings":["College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Informatin Science and Technology/College of Cyber Security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I1282113950"]},{"raw_affiliation_string":"College of Informatin Science and Technology / College of Cyber security, National Joint Engineering Research Center of Network Security Detection and Protection Technology, and Guangdong Key Laboratory of Data Security and Privacy Preserving, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5104727679"],"corresponding_institution_ids":["https://openalex.org/I1282113950","https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":4.1282,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.94775463,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"3883","last_page":"3900"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11407","display_name":"Innovative Microfluidic and Catalytic Techniques Innovation","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.7956401109695435},{"id":"https://openalex.org/keywords/chain","display_name":"Chain (unit)","score":0.5098849534988403},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4733719229698181},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.31131911277770996},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.19931501150131226}],"concepts":[{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.7956401109695435},{"id":"https://openalex.org/C199185054","wikidata":"https://www.wikidata.org/wiki/Q552299","display_name":"Chain (unit)","level":2,"score":0.5098849534988403},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4733719229698181},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31131911277770996},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.19931501150131226},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3339675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3339675","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4360914524","display_name":null,"funder_award_id":"62102166","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":60,"referenced_works":["https://openalex.org/W851575271","https://openalex.org/W1908345781","https://openalex.org/W1978649650","https://openalex.org/W1999066327","https://openalex.org/W2102685956","https://openalex.org/W2573050643","https://openalex.org/W2724185994","https://openalex.org/W2739845435","https://openalex.org/W2763398287","https://openalex.org/W2887912929","https://openalex.org/W2889291629","https://openalex.org/W2897676665","https://openalex.org/W2907137177","https://openalex.org/W2910702660","https://openalex.org/W2948007978","https://openalex.org/W2962718239","https://openalex.org/W2969400704","https://openalex.org/W2974125212","https://openalex.org/W2975872441","https://openalex.org/W2982365671","https://openalex.org/W2984693664","https://openalex.org/W2984747683","https://openalex.org/W2985948189","https://openalex.org/W2994815117","https://openalex.org/W3023021396","https://openalex.org/W3098957467","https://openalex.org/W3099201326","https://openalex.org/W3112237412","https://openalex.org/W3151748982","https://openalex.org/W3155347870","https://openalex.org/W3157195517","https://openalex.org/W3161459743","https://openalex.org/W3162192447","https://openalex.org/W3166024680","https://openalex.org/W3168938567","https://openalex.org/W3170551246","https://openalex.org/W3173559144","https://openalex.org/W3175652904","https://openalex.org/W3177820985","https://openalex.org/W3194775218","https://openalex.org/W3202887189","https://openalex.org/W3208374658","https://openalex.org/W3216623197","https://openalex.org/W4205325156","https://openalex.org/W4211068006","https://openalex.org/W4211263987","https://openalex.org/W4226442811","https://openalex.org/W4248175462","https://openalex.org/W4250992750","https://openalex.org/W4288057768","https://openalex.org/W4315647104","https://openalex.org/W4316022171","https://openalex.org/W4319594769","https://openalex.org/W4323896986","https://openalex.org/W4360993055","https://openalex.org/W6678832241","https://openalex.org/W6732306980","https://openalex.org/W6772400047","https://openalex.org/W6793285265","https://openalex.org/W6794655742"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2120204135","https://openalex.org/W2139396251","https://openalex.org/W1796293478","https://openalex.org/W1577544887","https://openalex.org/W2168276503","https://openalex.org/W1573537275","https://openalex.org/W2105713543","https://openalex.org/W4205908955"],"abstract_inverted_index":{"Blockchain":[0],"rewriting":[1,46,79,85],"has":[2],"become":[3],"widely":[4],"explored":[5],"for":[6,28,40,81,125],"addressing":[7],"data":[8,14],"deletion":[9],"requirements,":[10],"such":[11],"as":[12,148,150],"error":[13],"deletion,":[15],"space-saving,":[16],"and":[17,95,127,133,154],"compliance":[18],"with":[19,36,67,117,145],"the":[20,37,55,84,159,168,171],"\u201cright-to-be-forgotten\u201d":[21],"rule.":[22],"However,":[23],"existing":[24],"approaches":[25],"are":[26,164],"inadequate":[27],"handling":[29],"cross-chain":[30,61,101,114,130,141],"redaction":[31,131],"issues,":[32,33],"in":[34,64],"facing":[35],"increasing":[38],"need":[39],"inter-chain":[41,65],"communication.":[42],"In":[43],"particular,":[44],"transaction":[45,91,134],"on":[47,54,120],"a":[48,90,113,122,139],"blockchain":[49],"might":[50],"have":[51],"relevant":[52],"effects":[53],"states":[56,132],"of":[57,86,170],"other":[58],"blockchains.":[59],"The":[60,72,136],"interoperability":[62],"results":[63],"transactions":[66,88,102],"more":[68],"complex":[69],"dependency":[70],"relations.":[71],"issues":[73],"pose":[74],"new":[75],"challenges":[76],"to":[77,157,166],"achieve":[78,96],"consistency,":[80],"example,":[82],"ensuring":[83],"related":[87],"when":[89],"is":[92],"being":[93],"modified,":[94],"atomic":[97],"rewriting,":[98],"whereby":[99],"two":[100],"must":[103],"either":[104],"all,":[105],"or":[106],"neither,":[107],"be":[108],"processed.":[109],"This":[110],"paper":[111,137],"introduces":[112],"solution":[115],"IvyRedaction,":[116],"an":[118],"emphasis":[119],"customizing":[121],"decentralized":[123],"intermediary":[124],"generating":[126],"maintaining":[128],"global":[129],"dependencies.":[135],"proposes":[138],"novel":[140],"state":[142],"mapping":[143],"method":[144],"rollback":[146],"rules,":[147],"well":[149],"customized":[151],"block":[152],"structures":[153],"verification":[155],"algorithms,":[156],"address":[158],"aforementioned":[160],"issues.":[161],"Proof-of-concept":[162],"experiments":[163],"conducted":[165],"demonstrate":[167],"feasibility":[169],"proposed":[172],"framework.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
