CDEdit: A Highly Applicable Redactable Blockchain with Controllable Editing Privilege and Diversified Editing Types

05/14/2022
by   Xiaofeng Chen, et al.
0

Redactable blockchains allow modifiers or voting committees with modification privileges to edit the data on the chain. Trapdoor holders in chameleon-based hash redactable blockchains can quickly compute hash collisions for arbitrary data, and without breaking the link of the hash-chain. However, chameleon-based hash redactable blockchain schemes have difficulty solving the problem of multi-level editing requests and competing for modification privileges. In this paper, we propose CDEdit, a highly applicable redactable blockchain with controllable editing privilege and diversified editing types. The proposed scheme increases the cost of invalid or malicious requests by paying the deposit on each edit request. At the same time, the editing privilege is subdivided into request, modification, and verification privileges, and the modification privilege token is distributed efficiently to prevent the abuse of the modification privilege and collusion attacks. We use chameleon hashes with ephemeral trapdoor (CHET) and ciphertext policy attribute-based encryption (CP-ABE) to implement two editing types of transaction-level and block-level, and present a practical instantiation and security analysis. Finally, the implementation and evaluation show that our scheme only costs low-performance overhead and is suitable for multi-level editing requests and modification privilege competition scenarios.

READ FULL TEXT

page 2

page 3

page 4

page 5

page 6

page 7

page 9

page 10

research
01/29/2020

RSA and redactable blockchains

A blockchain is redactable if a private key holder (e.g. a central autho...
research
05/19/2020

Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications

Blockchain has received tremendous attention in non-monetary application...
research
11/21/2017

Dynamic Distributed Storage for Scaling Blockchains

Blockchain uses the idea of storing transaction data in the form of a di...
research
03/06/2021

Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things

Unauthorized resource access represents a typical security threat in the...
research
03/31/2022

TransEditor: Transformer-Based Dual-Space GAN for Highly Controllable Facial Editing

Recent advances like StyleGAN have promoted the growth of controllable f...
research
01/11/2023

How To Optimize My Blockchain? A Multi-Level Recommendation Approach

Aside from the conception of new blockchain architectures, existing bloc...

Please sign up or login with your details

Forgot password? Click here to reset