{"id":"https://openalex.org/W3194775218","doi":"https://doi.org/10.1109/tifs.2021.3107146","title":"<i>K</i>-Time Modifiable and Epoch-Based Redactable Blockchain","display_name":"<i>K</i>-Time Modifiable and Epoch-Based Redactable Blockchain","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3194775218","doi":"https://doi.org/10.1109/tifs.2021.3107146","mag":"3194775218"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3107146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3107146","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061574999","display_name":"Shengmin Xu","orcid":"https://orcid.org/0000-0002-9121-0171"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["CN","SG"],"is_corresponding":true,"raw_author_name":"Shengmin Xu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","Secure Mobile Center, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Secure Mobile Center, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357283","display_name":"Jinhua Ma","orcid":"https://orcid.org/0000-0002-6870-048X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["CN","SG"],"is_corresponding":false,"raw_author_name":"Jinhua Ma","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","School of Computing and Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031931063","display_name":"Xinyi Huang","orcid":"https://orcid.org/0000-0003-0070-1707"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyi Huang","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061574999"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I79891267"],"apc_list":null,"apc_paid":null,"fwci":17.0262,"has_fulltext":false,"cited_by_count":81,"citation_normalized_percentile":{"value":0.99183982,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"16","issue":null,"first_page":"4507","last_page":"4520"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9224944710731506},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.9113293886184692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8323273062705994},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7142235040664673},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5833317637443542},{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.5461505651473999},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.526908814907074},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.4851011037826538},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4837679862976074},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.46129927039146423},{"id":"https://openalex.org/keywords/ledger","display_name":"Ledger","score":0.44591546058654785},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4431687593460083},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.43653783202171326},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4198518991470337},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.177369624376297},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16650989651679993},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10162892937660217}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9224944710731506},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.9113293886184692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8323273062705994},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7142235040664673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5833317637443542},{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.5461505651473999},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.526908814907074},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.4851011037826538},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4837679862976074},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.46129927039146423},{"id":"https://openalex.org/C91302708","wikidata":"https://www.wikidata.org/wiki/Q2732056","display_name":"Ledger","level":2,"score":0.44591546058654785},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4431687593460083},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.43653783202171326},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4198518991470337},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.177369624376297},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16650989651679993},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10162892937660217},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2021.3107146","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3107146","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3041179666","display_name":null,"funder_award_id":"61872089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7528015336","display_name":null,"funder_award_id":"62102090","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W162787226","https://openalex.org/W1492049863","https://openalex.org/W1646354800","https://openalex.org/W1922219439","https://openalex.org/W1977902874","https://openalex.org/W2013686672","https://openalex.org/W2043007983","https://openalex.org/W2139910984","https://openalex.org/W2168223599","https://openalex.org/W2284345771","https://openalex.org/W2290426788","https://openalex.org/W2502299265","https://openalex.org/W2590233175","https://openalex.org/W2724185994","https://openalex.org/W2744999500","https://openalex.org/W2748692995","https://openalex.org/W2765635759","https://openalex.org/W2777447168","https://openalex.org/W2790332478","https://openalex.org/W2791549571","https://openalex.org/W2793333522","https://openalex.org/W2794780961","https://openalex.org/W2810711254","https://openalex.org/W2828755943","https://openalex.org/W2896376638","https://openalex.org/W2910702660","https://openalex.org/W2912009853","https://openalex.org/W2914026086","https://openalex.org/W2948007978","https://openalex.org/W2952209613","https://openalex.org/W2969400704","https://openalex.org/W2998196208","https://openalex.org/W3010754975","https://openalex.org/W3098957467","https://openalex.org/W3151748982","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6636797535","https://openalex.org/W6746873430","https://openalex.org/W6764155960","https://openalex.org/W6793285265"],"related_works":["https://openalex.org/W1517747134","https://openalex.org/W2802479602","https://openalex.org/W4386576376","https://openalex.org/W1570380538","https://openalex.org/W3182748079","https://openalex.org/W2019522068","https://openalex.org/W2566257015","https://openalex.org/W2963444893","https://openalex.org/W4378965685","https://openalex.org/W4378218521"],"abstract_inverted_index":{"As":[0],"an":[1,17],"immutable":[2],"append-only":[3],"distributed":[4],"ledger,":[5],"blockchain":[6,23,55,64,100,117],"allows":[7],"a":[8,14,22,72,77,108,120,147,157],"group":[9],"of":[10,98,153],"participants":[11],"to":[12,51,68,123],"reach":[13],"consensus":[15],"in":[16,35,71,101],"untrustworthy":[18],"ecosystem.":[19],"Immutability":[20],"is":[21,31,79,133],"feature":[24],"that":[25,42,93,171],"persists":[26],"data":[27,46],"forever,":[28],"but":[29],"it":[30],"no":[32,87],"longer":[33],"legal":[34],"reality.":[36],"Blockchain":[37],"has":[38,65],"unchangeable":[39],"improper":[40],"contents":[41],"violate":[43],"laws.":[44],"Moreover,":[45],"regulation":[47],"toward":[48],"\u201cthe":[49],"right":[50],"be":[52,57],"forgotten\u201d":[53],"requires":[54],"must":[56],"modifiable.":[58],"To":[59],"address":[60],"this":[61,104],"problem,":[62],"redactable":[63,99,116],"been":[66],"introduced":[67],"relax":[69],"immutability":[70],"controlled":[73],"way.":[74],"However,":[75],"once":[76],"participant":[78],"authorized,":[80],"she/he":[81],"can":[82],"rewrite":[83],"any":[84],"content":[85],"and":[86,114,127,142,150,155,167,177],"penalty":[88,122],"for":[89],"the":[90,95,180],"malicious":[91,129],"behavior":[92],"hinders":[94],"wide":[96],"deployment":[97],"practice.":[102],"In":[103],"paper,":[105],"we":[106],"introduce":[107],"new":[109],"notion,":[110],"dubbed":[111],"k-time":[112],"modifiable":[113],"epoch-based":[115],"(KERB)":[118],"with":[119,161],"monetary":[121],"control":[124],"rewriting":[125],"privileges":[126],"penalize":[128],"behaviors.":[130],"Our":[131],"solution":[132,173],"built":[134],"up":[135],"from":[136],"simple":[137],"building":[138],"blocks:":[139],"digital":[140],"signatures":[141],"chameleon":[143],"hashes.":[144],"We":[145],"give":[146],"formal":[148,162],"definition":[149],"security":[151],"models":[152],"KERB,":[154],"present":[156],"generic":[158],"construction":[159],"along":[160],"proofs.":[163],"The":[164],"extensive":[165],"comparison":[166],"experimental":[168],"analysis":[169],"illustrate":[170],"our":[172],"enjoys":[174],"superior":[175],"functionalities":[176],"performances":[178],"than":[179],"state-of-the-art":[181],"solutions.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":29},{"year":2022,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
