PRBC:一个实用的可读区块链,结合了变色龙哈希函数和属性控制

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Xiangyu Wu , Xuehui Du , Shihao Wang , Qiantao Yang , Aodi Liu , Wenjuan Wang
{"title":"PRBC:一个实用的可读区块链,结合了变色龙哈希函数和属性控制","authors":"Xiangyu Wu ,&nbsp;Xuehui Du ,&nbsp;Shihao Wang ,&nbsp;Qiantao Yang ,&nbsp;Aodi Liu ,&nbsp;Wenjuan Wang","doi":"10.1016/j.jisa.2025.104045","DOIUrl":null,"url":null,"abstract":"<div><div>The introduction of a redactable blockchain overcomes the challenges posed by immutability, including the inability to correct erroneous data, delete private information, and regulate illegal content. In recent years, to achieve fine-grained control over the redaction permissions of transaction data, policy-based chameleon hash (PCH) functions and their various variants have been proposed and integrated into traditional blockchains to support transaction-level redacting. However, these solutions face the problem of permission abuse, where authorized users may transfer their permissions to unauthorized individuals driven by self-interest, leading to a loss of control over permissions. Additionally, the modifiability of block data results in the potential existence of multiple legitimate block versions at the same height, making it difficult for off-chain validators to verify the timeliness of blocks solely based on block height and timestamps. To address these issues, this paper introduces attribute-based policies and identity tracing mechanisms into the chameleon hash function, proposing a practical redactable blockchain called PRBC, with the formal definitions and security models. By employing several simple cryptographic tools, such as chameleon hash functions, threshold signatures, and identity lists, fine-grained control over redaction permissions, tracking of malicious user identities, and effective validation of block timeliness are achieved, along with a complete construction and rigorous security proof of the scheme. Finally, the prototype of PRBC is constructed on the Tendermint blockchain and compared with the state-of-the-art solutions. The comprehensive evaluation indicates that the solution presented in this paper offers superior performance.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"90 ","pages":"Article 104045"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"PRBC: A practical redactable blockchain incorporating chameleon hash functions with attribute control\",\"authors\":\"Xiangyu Wu ,&nbsp;Xuehui Du ,&nbsp;Shihao Wang ,&nbsp;Qiantao Yang ,&nbsp;Aodi Liu ,&nbsp;Wenjuan Wang\",\"doi\":\"10.1016/j.jisa.2025.104045\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The introduction of a redactable blockchain overcomes the challenges posed by immutability, including the inability to correct erroneous data, delete private information, and regulate illegal content. In recent years, to achieve fine-grained control over the redaction permissions of transaction data, policy-based chameleon hash (PCH) functions and their various variants have been proposed and integrated into traditional blockchains to support transaction-level redacting. However, these solutions face the problem of permission abuse, where authorized users may transfer their permissions to unauthorized individuals driven by self-interest, leading to a loss of control over permissions. Additionally, the modifiability of block data results in the potential existence of multiple legitimate block versions at the same height, making it difficult for off-chain validators to verify the timeliness of blocks solely based on block height and timestamps. To address these issues, this paper introduces attribute-based policies and identity tracing mechanisms into the chameleon hash function, proposing a practical redactable blockchain called PRBC, with the formal definitions and security models. By employing several simple cryptographic tools, such as chameleon hash functions, threshold signatures, and identity lists, fine-grained control over redaction permissions, tracking of malicious user identities, and effective validation of block timeliness are achieved, along with a complete construction and rigorous security proof of the scheme. Finally, the prototype of PRBC is constructed on the Tendermint blockchain and compared with the state-of-the-art solutions. The comprehensive evaluation indicates that the solution presented in this paper offers superior performance.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"90 \",\"pages\":\"Article 104045\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625000821\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000821","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

可读区块链的引入克服了不可变性带来的挑战,包括无法纠正错误数据、删除私有信息和管理非法内容。近年来,为了实现对交易数据编校权限的细粒度控制,人们提出了基于策略的变色龙哈希(PCH)函数及其各种变体,并将其集成到传统区块链中,以支持交易级编校。然而,这些解决方案面临着权限滥用的问题,授权用户可能会出于自身利益的驱使将其权限转移给未授权的个人,从而导致对权限的控制丧失。此外,块数据的可修改性导致可能存在相同高度的多个合法块版本,这使得链下验证者难以仅根据块高度和时间戳来验证块的时效性。为了解决这些问题,本文在变色龙哈希函数中引入了基于属性的策略和身份跟踪机制,提出了一种实用的可读区块链,称为PRBC,具有形式化定义和安全模型。通过使用变色龙哈希函数、阈值签名、身份列表等几种简单的加密工具,实现了对编校权限的细粒度控制、恶意用户身份的跟踪、对区块时效性的有效验证,并对方案进行了完整的构造和严格的安全性证明。最后,在Tendermint区块链上构建了PRBC原型,并与最先进的解决方案进行了比较。综合评价表明,该方案具有较好的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
PRBC: A practical redactable blockchain incorporating chameleon hash functions with attribute control
The introduction of a redactable blockchain overcomes the challenges posed by immutability, including the inability to correct erroneous data, delete private information, and regulate illegal content. In recent years, to achieve fine-grained control over the redaction permissions of transaction data, policy-based chameleon hash (PCH) functions and their various variants have been proposed and integrated into traditional blockchains to support transaction-level redacting. However, these solutions face the problem of permission abuse, where authorized users may transfer their permissions to unauthorized individuals driven by self-interest, leading to a loss of control over permissions. Additionally, the modifiability of block data results in the potential existence of multiple legitimate block versions at the same height, making it difficult for off-chain validators to verify the timeliness of blocks solely based on block height and timestamps. To address these issues, this paper introduces attribute-based policies and identity tracing mechanisms into the chameleon hash function, proposing a practical redactable blockchain called PRBC, with the formal definitions and security models. By employing several simple cryptographic tools, such as chameleon hash functions, threshold signatures, and identity lists, fine-grained control over redaction permissions, tracking of malicious user identities, and effective validation of block timeliness are achieved, along with a complete construction and rigorous security proof of the scheme. Finally, the prototype of PRBC is constructed on the Tendermint blockchain and compared with the state-of-the-art solutions. The comprehensive evaluation indicates that the solution presented in this paper offers superior performance.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信