{"id":"https://openalex.org/W4286372554","doi":"https://doi.org/10.1109/tifs.2022.3192716","title":"Redactable Blockchain From Decentralized Chameleon Hash Functions","display_name":"Redactable Blockchain From Decentralized Chameleon Hash Functions","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4286372554","doi":"https://doi.org/10.1109/tifs.2022.3192716"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3192716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3192716","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073539263","display_name":"Meng Jia","orcid":"https://orcid.org/0000-0003-3623-3490"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Jia","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100736037","display_name":"Li Wu Zheng","orcid":"https://orcid.org/0000-0002-7593-0208"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Zheng","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047484085","display_name":"Mingxi Lai","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingxi Lai","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100367956","display_name":"Donghui Wang","orcid":"https://orcid.org/0000-0002-2477-9384"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Donghui Wang","raw_affiliation_strings":["Huawei, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Huawei, Beijing, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100394562","display_name":"Fei Liu","orcid":"https://orcid.org/0000-0001-7141-5105"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Liu","raw_affiliation_strings":["Huawei, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Huawei, Beijing, China","institution_ids":["https://openalex.org/I2250955327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5073539263"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":20.6707,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.99435134,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"17","issue":null,"first_page":"2771","last_page":"2783"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9407784938812256},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.8939837217330933},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7629154920578003},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6924326419830322},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.5772801041603088},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4967191815376282},{"id":"https://openalex.org/keywords/accumulator","display_name":"Accumulator (cryptography)","score":0.4815440773963928},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.48079147934913635},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4447656571865082},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.4328348636627197},{"id":"https://openalex.org/keywords/decentralization","display_name":"Decentralization","score":0.4319985806941986},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.43029555678367615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3971228003501892},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36173173785209656},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2374296486377716},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13787809014320374},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12278169393539429},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.12034586071968079},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10414391756057739},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0919947624206543}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9407784938812256},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.8939837217330933},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7629154920578003},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6924326419830322},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.5772801041603088},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4967191815376282},{"id":"https://openalex.org/C2078106","wikidata":"https://www.wikidata.org/wiki/Q14906620","display_name":"Accumulator (cryptography)","level":2,"score":0.4815440773963928},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48079147934913635},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4447656571865082},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.4328348636627197},{"id":"https://openalex.org/C136810230","wikidata":"https://www.wikidata.org/wiki/Q188961","display_name":"Decentralization","level":2,"score":0.4319985806941986},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.43029555678367615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3971228003501892},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36173173785209656},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2374296486377716},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13787809014320374},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12278169393539429},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.12034586071968079},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10414391756057739},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0919947624206543},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2022.3192716","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3192716","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2780597473","display_name":null,"funder_award_id":"2042022kf0046","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5215447159","display_name":null,"funder_award_id":"2021YFB2700200","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6994201786","display_name":null,"funder_award_id":"U1836202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7322606774","display_name":null,"funder_award_id":"2042022kf1195","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G782110378","display_name":null,"funder_award_id":"62172303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7960939272","display_name":null,"funder_award_id":"62076187","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322183","display_name":"Huawei Technologies","ror":"https://ror.org/00cmhce21"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1532961226","https://openalex.org/W1562394980","https://openalex.org/W1589586740","https://openalex.org/W2004765731","https://openalex.org/W2047829534","https://openalex.org/W2094240047","https://openalex.org/W2590233175","https://openalex.org/W2604844934","https://openalex.org/W2724185994","https://openalex.org/W2793701237","https://openalex.org/W2883305949","https://openalex.org/W2910702660","https://openalex.org/W2913435035","https://openalex.org/W2917723740","https://openalex.org/W2948007978","https://openalex.org/W2963312316","https://openalex.org/W2973414267","https://openalex.org/W2982735562","https://openalex.org/W3013936128","https://openalex.org/W3083631507","https://openalex.org/W3088334209","https://openalex.org/W3090742328","https://openalex.org/W3093459642","https://openalex.org/W3098957467","https://openalex.org/W3106855293","https://openalex.org/W3112237412","https://openalex.org/W3156151296","https://openalex.org/W3166024680","https://openalex.org/W3194775218","https://openalex.org/W3210949231","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W4255738563"],"related_works":["https://openalex.org/W1517747134","https://openalex.org/W2802479602","https://openalex.org/W2954977039","https://openalex.org/W4386576376","https://openalex.org/W1570380538","https://openalex.org/W3182748079","https://openalex.org/W2019522068","https://openalex.org/W2510867554","https://openalex.org/W3090206925","https://openalex.org/W4399372440"],"abstract_inverted_index":{"Blockchain":[0],"is":[1,159],"a":[2,47,86,107,116],"technology":[3],"with":[4,77,149],"decentralization":[5,53],"and":[6,9,64,118,145],"immutability":[7,19],"features":[8],"has":[10],"been":[11],"employed":[12],"for":[13,60,91],"auditing":[14],"by":[15,100],"many":[16],"applications.":[17],"However,":[18],"sometimes":[20],"limits":[21],"the":[22,52,80,120,138],"application":[23],"of":[24,115],"blockchain":[25,33,43,76,93,102,109,153],"technology.":[26],"For":[27],"example,":[28],"vulnerable":[29],"smart":[30],"contracts":[31],"on":[32,137],"cannot":[34],"be":[35,98],"redacted":[36,121],"due":[37],"to":[38,154],"immutability.":[39],"The":[40],"existing":[41],"redactable":[42,75,92,108,152],"solutions":[44,57],"either":[45],"have":[46],"low":[48],"efficiency":[49],"or":[50],"violate":[51],"feature.":[54],"Moreover,":[55],"those":[56],"lack":[58],"mechanisms":[59],"tracing":[61],"redaction":[62,96],"history":[63],"checking":[65],"block":[66,117,132],"consistency.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71,84,128,142],"present":[72],"an":[73,124,130],"efficient":[74,131,160],"traceability":[78],"in":[79,161],"decentralized":[81,87,151],"setting.":[82],"Specifically,":[83],"propose":[85,129],"chameleon":[88],"hash":[89],"function":[90],"that":[94,111,156],"every":[95],"must":[97],"approved":[99],"multiple":[101],"nodes.":[103],"We":[104],"also":[105],"design":[106],"structure":[110],"maintains":[112],"all":[113],"redactions":[114],"encodes":[119],"blocks":[122],"into":[123],"RSA":[125,139],"accumulator.":[126,140],"Then,":[127],"consistency":[133],"check":[134],"protocol":[135],"based":[136],"Finally,":[141],"conduct":[143],"experiments":[144],"compare":[146],"our":[147,157],"scheme":[148],"another":[150],"demonstrate":[155],"solution":[158],"practice.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":26},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":18}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
