{"id":"https://openalex.org/W4414062860","doi":"https://doi.org/10.1145/3765896","title":"A Regulatable Blockchain Rewriting Scheme for Identity-Aware Data Modification and User Identity Update","display_name":"A Regulatable Blockchain Rewriting Scheme for Identity-Aware Data Modification and User Identity Update","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4414062860","doi":"https://doi.org/10.1145/3765896"},"language":"en","primary_location":{"id":"doi:10.1145/3765896","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3765896","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Fu Zhang","orcid":"https://orcid.org/0009-0008-5998-0927"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I4210112475","display_name":"Shenwu Technology Group Corp (China)","ror":"https://ror.org/01ef25a22","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210112475"]},{"id":"https://openalex.org/I4210165591","display_name":"Network Group (Czechia)","ror":"https://ror.org/055hmgs82","country_code":"CZ","type":"company","lineage":["https://openalex.org/I4210165591"]}],"countries":["CN","CZ"],"is_corresponding":true,"raw_author_name":"Fu Zhang","raw_affiliation_strings":["Beijing Shengxin Network Technology Co., Ltd","School of Cyberspace Security, Beijing University of Posts and Telecommunications","Beijing Shengxin Network Technology Co., Ltd., Beijing China","School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0008-5998-0927","affiliations":[{"raw_affiliation_string":"Beijing Shengxin Network Technology Co., Ltd","institution_ids":["https://openalex.org/I4210165591"]},{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Beijing Shengxin Network Technology Co., Ltd., Beijing China","institution_ids":["https://openalex.org/I4210112475"]},{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002415715","display_name":"Yuqing Zhang","orcid":"https://orcid.org/0000-0002-1120-3175"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuqing Zhang","raw_affiliation_strings":["China Unicom Data Intelligence Co., Ltd","China Unicom Data Intelligence Co., Ltd., Hangzhou China"],"raw_orcid":"https://orcid.org/0000-0002-1120-3175","affiliations":[{"raw_affiliation_string":"China Unicom Data Intelligence Co., Ltd","institution_ids":["https://openalex.org/I6507939"]},{"raw_affiliation_string":"China Unicom Data Intelligence Co., Ltd., Hangzhou China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101582728","display_name":"Zhaofeng Ma","orcid":"https://orcid.org/0000-0001-7875-4169"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaofeng Ma","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications","School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing China"],"raw_orcid":"https://orcid.org/0000-0001-7875-4169","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Lin Sun","orcid":"https://orcid.org/0009-0007-2446-9355"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Sun","raw_affiliation_strings":["China Unicom Data Intelligence Co., Ltd","China Unicom Data Intelligence Co., Ltd., Beijing China"],"raw_orcid":"https://orcid.org/0009-0007-2446-9355","affiliations":[{"raw_affiliation_string":"China Unicom Data Intelligence Co., Ltd","institution_ids":["https://openalex.org/I6507939"]},{"raw_affiliation_string":"China Unicom Data Intelligence Co., Ltd., Beijing China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102154745","display_name":"Yushi Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210118859","display_name":"Novokuznetsk State Institute of Advanced Medical Education","ror":"https://ror.org/02eg1b280","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210118859"]}],"countries":["CN","RU"],"is_corresponding":false,"raw_author_name":"Yushi Shen","raw_affiliation_strings":["NovNet Computing System Tech Co.,Ltd","NovNet Computing System Tech Co.,Ltd., Beijing China"],"raw_orcid":"https://orcid.org/0009-0001-1111-229X","affiliations":[{"raw_affiliation_string":"NovNet Computing System Tech Co.,Ltd","institution_ids":["https://openalex.org/I4210118859"]},{"raw_affiliation_string":"NovNet Computing System Tech Co.,Ltd., Beijing China","institution_ids":["https://openalex.org/I4210090176"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4210112475","https://openalex.org/I4210165591"],"apc_list":null,"apc_paid":null,"fwci":2.9051,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.92761885,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"20","issue":"1","first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.8544999957084656},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.61080002784729},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.588100016117096},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5623999834060669},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5608999729156494},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5432000160217285},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.5289000272750854},{"id":"https://openalex.org/keywords/signcryption","display_name":"Signcryption","score":0.5034999847412109},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4684000015258789},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.44780001044273376}],"concepts":[{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.8544999957084656},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8032000064849854},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.61080002784729},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.588100016117096},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5623999834060669},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5608999729156494},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5432000160217285},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.5289000272750854},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.5034999847412109},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4684000015258789},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.44780001044273376},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44029998779296875},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.43689998984336853},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42170000076293945},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.40529999136924744},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.4016000032424927},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.3991999924182892},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.37790000438690186},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.37619999051094055},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.35929998755455017},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3560999929904938},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.3555999994277954},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.35409998893737793},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.33390000462532043},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3098999857902527},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.30239999294281006},{"id":"https://openalex.org/C17435882","wikidata":"https://www.wikidata.org/wiki/Q17030435","display_name":"HOL","level":2,"score":0.295199990272522},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2847000062465668},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.2825999855995178},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.27790001034736633},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.26489999890327454},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C203265346","wikidata":"https://www.wikidata.org/wiki/Q11387554","display_name":"Proof assistant","level":3,"score":0.25529998540878296},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.25290000438690186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3765896","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3765896","pdf_url":null,"source":{"id":"https://openalex.org/S131231701","display_name":"ACM Transactions on the Web","issn_l":"1559-1131","issn":["1559-1131","1559-114X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on the Web","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2673068193","display_name":null,"funder_award_id":"U24B20146","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1890078278","https://openalex.org/W2397264655","https://openalex.org/W2724185994","https://openalex.org/W2917723740","https://openalex.org/W2975872441","https://openalex.org/W3006554290","https://openalex.org/W3010471917","https://openalex.org/W3166024680","https://openalex.org/W3168938567","https://openalex.org/W3173891559","https://openalex.org/W3194775218","https://openalex.org/W3210949231","https://openalex.org/W4214913937","https://openalex.org/W4246822432","https://openalex.org/W4254211903","https://openalex.org/W4311165445","https://openalex.org/W4323896986","https://openalex.org/W4360993055","https://openalex.org/W4387805962"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W3126939372","https://openalex.org/W4386732777","https://openalex.org/W2055312385"],"abstract_inverted_index":{"The":[0,107,151],"immutability":[1],"of":[2,41,55],"blockchain":[3,31,110,148],"technology,":[4],"while":[5,101],"fundamental":[6],"to":[7,93],"its":[8,161],"trustworthiness,":[9],"introduces":[10,65],"significant":[11],"challenges":[12],"for":[13,141,164],"dynamic":[14],"data":[15,25,99],"governance":[16],"scenarios":[17],"such":[18],"as":[19],"financial":[20],"transaction":[21],"corrections,":[22],"privacy-preserving":[23],"healthcare":[24],"updates,":[26],"and":[27,58,87,97,128,146,154],"GDPR":[28],"compliance.":[29],"Existing":[30],"rewriting":[32,111,149],"schemes":[33],"based":[34],"on":[35,132],"chameleon":[36,67,88],"hash":[37,68,89],"techniques":[38],"alleviate":[39],"some":[40],"these":[42],"issues":[43],"but":[44],"suffer":[45],"from":[46],"inherent":[47],"limitations,":[48],"including":[49],"complex":[50],"key":[51],"management":[52],"overhead,":[53],"lack":[54],"regulatory":[56,134],"mechanisms,":[57],"inflexible":[59],"access":[60],"policy":[61],"enforcement.":[62],"This":[63],"article":[64],"a":[66,79,133],"that":[69],"supports":[70],"the":[71,143,147,157],"identity":[72,105],"update,":[73],"called":[74],"IDCHU":[75,115,144],",":[76],"which":[77],"is":[78],"novel":[80],"cryptographic":[81,129],"primitive":[82],"integrating":[83],"identity-based":[84],"proxy":[85],"re-encryption":[86],"with":[90],"ephemeral":[91],"trapdoors":[92],"enable":[94],"secure,":[95],"traceable":[96],"identity-aware":[98],"modifications":[100],"supporting":[102],"flexible":[103],"user":[104],"updates.":[106],"proposed":[108],"regulable":[109],"scheme":[112],"built":[113],"upon":[114],"algorithm":[116,145],"ensures":[117],"compliance":[118],"through":[119],"three":[120],"core":[121],"mechanisms:":[122],"identity-bound":[123],"modification":[124,127],"authority,":[125],"time-constrained":[126],"traceability":[130],"recorded":[131],"blockchain.":[135],"We":[136],"provide":[137],"formal":[138],"security":[139],"proofs":[140],"both":[142],"scheme.":[150],"experimental":[152],"evaluations":[153],"comparisons":[155],"validate":[156],"scheme\u2019s":[158],"efficiency,":[159],"showcasing":[160],"practical":[162],"viability":[163],"real-world":[165],"applications.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
