Xiangyu Wu , Xuehui Du , Shihao Wang , Qiantao Yang , Aodi Liu , Wenjuan Wang
{"title":"PRBC: A practical redactable blockchain incorporating chameleon hash functions with attribute control","authors":"Xiangyu Wu , Xuehui Du , Shihao Wang , Qiantao Yang , Aodi Liu , Wenjuan Wang","doi":"10.1016/j.jisa.2025.104045","DOIUrl":null,"url":null,"abstract":"<div><div>The introduction of a redactable blockchain overcomes the challenges posed by immutability, including the inability to correct erroneous data, delete private information, and regulate illegal content. In recent years, to achieve fine-grained control over the redaction permissions of transaction data, policy-based chameleon hash (PCH) functions and their various variants have been proposed and integrated into traditional blockchains to support transaction-level redacting. However, these solutions face the problem of permission abuse, where authorized users may transfer their permissions to unauthorized individuals driven by self-interest, leading to a loss of control over permissions. Additionally, the modifiability of block data results in the potential existence of multiple legitimate block versions at the same height, making it difficult for off-chain validators to verify the timeliness of blocks solely based on block height and timestamps. To address these issues, this paper introduces attribute-based policies and identity tracing mechanisms into the chameleon hash function, proposing a practical redactable blockchain called PRBC, with the formal definitions and security models. By employing several simple cryptographic tools, such as chameleon hash functions, threshold signatures, and identity lists, fine-grained control over redaction permissions, tracking of malicious user identities, and effective validation of block timeliness are achieved, along with a complete construction and rigorous security proof of the scheme. Finally, the prototype of PRBC is constructed on the Tendermint blockchain and compared with the state-of-the-art solutions. The comprehensive evaluation indicates that the solution presented in this paper offers superior performance.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104045"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000821","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The introduction of a redactable blockchain overcomes the challenges posed by immutability, including the inability to correct erroneous data, delete private information, and regulate illegal content. In recent years, to achieve fine-grained control over the redaction permissions of transaction data, policy-based chameleon hash (PCH) functions and their various variants have been proposed and integrated into traditional blockchains to support transaction-level redacting. However, these solutions face the problem of permission abuse, where authorized users may transfer their permissions to unauthorized individuals driven by self-interest, leading to a loss of control over permissions. Additionally, the modifiability of block data results in the potential existence of multiple legitimate block versions at the same height, making it difficult for off-chain validators to verify the timeliness of blocks solely based on block height and timestamps. To address these issues, this paper introduces attribute-based policies and identity tracing mechanisms into the chameleon hash function, proposing a practical redactable blockchain called PRBC, with the formal definitions and security models. By employing several simple cryptographic tools, such as chameleon hash functions, threshold signatures, and identity lists, fine-grained control over redaction permissions, tracking of malicious user identities, and effective validation of block timeliness are achieved, along with a complete construction and rigorous security proof of the scheme. Finally, the prototype of PRBC is constructed on the Tendermint blockchain and compared with the state-of-the-art solutions. The comprehensive evaluation indicates that the solution presented in this paper offers superior performance.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.