{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T13:46:14Z","timestamp":1762609574288,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_27","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"460-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Redactable Blockchain in\u00a0the\u00a0Permissioned Setting"],"prefix":"10.1007","author":[{"given":"Chunying","family":"Peng","sequence":"first","affiliation":[]},{"given":"Haixia","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Huimei","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Jinling","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Ashritha, K., Sindhu, M., Lakshmy, K.: Redactable blockchain using enhanced chameleon hash function. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), pp. 323\u2013328. IEEE (2019)","DOI":"10.1109\/ICACCS.2019.8728524"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Magri, B., Venturi, D., Andrade, E.: Redactable blockchain-or-rewriting history in bitcoin and friends. In: 2017 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 111\u2013126. IEEE (2017)","DOI":"10.1109\/EuroSP.2017.37"},{"issue":"2","key":"27_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.Y.: High-speed high-security signatures. J. Cryptogr. Eng. 2(2), 77\u201389 (2012)","journal-title":"J. Cryptogr. Eng."},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-030-75539-3_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2021","author":"K Chalkias","year":"2021","unstructured":"Chalkias, K., Garillot, F., Kondi, Y., Nikolaenko, V.: Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures. In: Paterson, K.G. (ed.) CT-RSA 2021. LNCS, vol. 12704, pp. 577\u2013608. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75539-3_24"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-031-17146-8_19","volume-title":"Computer Security","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Zhao, Y.: Half-aggregation of Schnorr signatures with tight reductions. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) ESORICS 2022. LNCS, vol. 13555, pp. 385\u2013404. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17146-8_19"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.future.2019.04.028","volume":"99","author":"L Cheng","year":"2019","unstructured":"Cheng, L., Liu, J., Su, C., Liang, K., Xu, G., Wang, W.: Polynomial-based modifiable blockchain structure for removing fraud transactions. Futur. Gener. Comput. Syst. 99, 154\u2013163 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-78375-8_3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"B David","year":"2018","unstructured":"David, B., Ga\u017ei, P., Kiayias, A., Russell, A.: Ouroboros praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10821, pp. 66\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78375-8_3"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Derler, D., Samelin, K., Slamanig, D., Striecks, C.: Fine-grained and controlled rewriting in blockchains: chameleon-hashing gone attribute-based. IACR Cryptology ePrint Archive, p. 406 (2019)","DOI":"10.14722\/ndss.2019.23066"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In: 2019 IEEE Symposium on Security and Privacy, pp. 124\u2013138. IEEE (2019)","DOI":"10.1109\/SP.2019.00039"},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-030-66172-4_23","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"MS Dousti","year":"2020","unstructured":"Dousti, M.S., K\u00fcp\u00e7\u00fc, A.: Moderated redactable blockchains: a definitional framework with an efficient construct. In: Garcia-Alfaro, J., Navarro-Arribas, G., Herrera-Joancomarti, J. (eds.) DPM\/CBT -2020. LNCS, vol. 12484, pp. 355\u2013373. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66172-4_23"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-96881-0_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"G Fuchsbauer","year":"2018","unstructured":"Fuchsbauer, G., Kiltz, E., Loss, J.: The algebraic group model and its applications. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 33\u201362. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_2"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-662-46803-6_10","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Garay","year":"2015","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281\u2013310. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10"},{"issue":"2","key":"27_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"issue":"1","key":"27_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/23799927.2020.1842808","volume":"6","author":"D Grigoriev","year":"2021","unstructured":"Grigoriev, D., Shpilrain, V.: RSA and redactable blockchains. Int. J. Comput. Math Comput. Syst. Theory 6(1), 1\u20136 (2021)","journal-title":"Int. J. Comput. Math Comput. Syst. Theory"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Hou, H., Hao, S., Yuan, J., Xu, S., Zhao, Y.: Fine-grained and controllably redactable blockchain with harmful data forced removal. Secur. Commun. Netw. 2021 (2021)","DOI":"10.1155\/2021\/3680359"},{"issue":"6","key":"27_CR17","doi-asserted-by":"publisher","first-page":"3670","DOI":"10.1109\/TII.2019.2901011","volume":"15","author":"K Huang","year":"2019","unstructured":"Huang, K., et al.: Building redactable consortium blockchain for industrial internet-of-things. IEEE Trans. Industr. Inf. 15(6), 3670\u20133679 (2019)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Jia, Y., Sun, S.F., Zhang, Y., Liu, Z., Gu, D.: Redactable blockchain supporting supervision and self-management. In: ACM Asia Conference on Computer and Communications Security, ASIA CCS 2021, pp. 844\u2013858 (2021)","DOI":"10.1145\/3433210.3453091"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1109\/TIFS.2023.3245406","volume":"18","author":"J Li","year":"2023","unstructured":"Li, J., Ma, H., Wang, J., Song, Z., Xu, W., Zhang, R.: Wolverine: a scalable and transaction-consistent redactable permissionless blockchain. IEEE Trans. Inf. Forensics Secur. 18, 1653\u20131666 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR20","unstructured":"Li, X., Xu, J., Yin, L., Lu, Y., Tang, Q., Zhang, Z.: Escaping from consensus: instantly redactable blockchain protocols in permissionless setting. IACR Cryptology ePrint Archive, p. 223 (2021)"},{"issue":"5","key":"27_CR21","first-page":"653","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 19(5), 653\u2013659 (2017)","journal-title":"Int. J. Netw. Secur."},{"key":"27_CR22","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TIFS.2022.3156808","volume":"17","author":"J Ma","year":"2022","unstructured":"Ma, J., Xu, S., Ning, J., Huang, X., Deng, R.H.: Redactable blockchain in decentralized setting. IEEE Trans. Inf. Forensics Secur. 17, 1227\u20131242 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Marsalek, A., Zefferer, T.: A correctable public blockchain. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 554\u2013561. IEEE (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00080"},{"key":"27_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11586821_1","volume-title":"Cryptography and Coding","author":"U Maurer","year":"2005","unstructured":"Maurer, U.: Abstract models of computation in cryptography. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 1\u201312. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11586821_1"},{"key":"27_CR25","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Bus. Rev. 21260 (2008)"},{"key":"27_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-031-17551-0_5","volume-title":"Science of Cyber Security","author":"C Peng","year":"2022","unstructured":"Peng, C., Xu, H.: Redactable blockchain with fine-grained autonomy and transaction rollback. In: Su, C., Sakurai, K., Liu, F. (eds.) SciSec 2022. LNCS, vol. 13580, pp. 68\u201384. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17551-0_5"},{"key":"27_CR27","unstructured":"Puddu, I., Dmitrienko, A., Capkun, S.: $$\\mu $$chain: how to forget without hard forks. IACR Cryptology ePrint Archive, p. 106 (2017)"},{"issue":"3","key":"27_CR28","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1093\/ijlit\/eaz009","volume":"27","author":"M Schellekens","year":"2019","unstructured":"Schellekens, M.: Does regulation of illegal content need reconsideration in light of blockchains? Int. J. Law Inf. Technol. 27(3), 292\u2013305 (2019)","journal-title":"Int. J. Law Inf. Technol."},{"key":"27_CR29","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4, 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"issue":"2","key":"27_CR30","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1038\/s41431-017-0045-7","volume":"26","author":"M Shabani","year":"2018","unstructured":"Shabani, M., Borry, P.: Rules for processing genetic data for research purposes in view of the new EU general data protection regulation. Eur. J. Hum. Genet. 26(2), 149\u2013156 (2018)","journal-title":"Eur. J. Hum. Genet."},{"key":"27_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201997","author":"V Shoup","year":"1997","unstructured":"Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256\u2013266. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_18"},{"key":"27_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-662-64331-0_2","volume-title":"Financial Cryptography and Data Security","author":"SAK Thyagarajan","year":"2021","unstructured":"Thyagarajan, S.A.K., Bhat, A., Magri, B., Tschudi, D., Kate, A.: Reparo: publicly verifiable layer to repair blockchains. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 37\u201356. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_2"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., Vechev, M.: Securify: practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 67\u201382 (2018)","DOI":"10.1145\/3243734.3243780"},{"key":"27_CR34","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TIFS.2022.3217742","volume":"18","author":"S Xu","year":"2022","unstructured":"Xu, S., Huang, X., Yuan, J., Li, Y., Deng, R.H.: Accountable and fine-grained controllable rewriting in blockchains. IEEE Trans. Inf. Forensics Secur. 18, 101\u2013116 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR35","doi-asserted-by":"publisher","first-page":"4507","DOI":"10.1109\/TIFS.2021.3107146","volume":"16","author":"S Xu","year":"2021","unstructured":"Xu, S., Ning, J., Ma, J., Huang, X., Deng, R.H.: K-time modifiable and epoch-based redactable blockchain. IEEE Trans. Inf. Forensics Secur. 16, 4507\u20134520 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"27_CR36","doi-asserted-by":"crossref","unstructured":"Ye, T., Luo, M., Yang, Y., Choo, K.K.R., He, D.: A survey on redactable blockchain: challenges and opportunities. IEEE Trans. Netw. Sci. Eng. (2023)","DOI":"10.1109\/TNSE.2022.3233448"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:06:41Z","timestamp":1700471201000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}