{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:41:06Z","timestamp":1766504466723,"version":"3.44.0"},"reference-count":32,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1016\/j.hcc.2024.100281","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T08:21:36Z","timestamp":1731054096000},"page":"100281","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Redactable Blockchain from Accountable Weight Threshold Chameleon Hash"],"prefix":"10.1016","volume":"5","author":[{"given":"Qiang","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1023-6549","authenticated-orcid":false,"given":"Yanqi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiangyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoyi","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7853-1712","authenticated-orcid":false,"given":"Min","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0667-077X","authenticated-orcid":false,"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2008","series-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","key":"10.1016\/j.hcc.2024.100281_b1"},{"issue":"5","key":"10.1016\/j.hcc.2024.100281_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.jaccpubpol.2021.106881","article-title":"Blockchain and other distributed ledger technologies: where is the accounting?","volume":"40","author":"Gietzmann","year":"2021","journal-title":"J. Account. Publ. Policy"},{"year":"2012","series-title":"Design and analysis of multi-block-length hash functions","author":"\u00d6zEN","key":"10.1016\/j.hcc.2024.100281_b3"},{"key":"10.1016\/j.hcc.2024.100281_b4","series-title":"2019 5th International Conference on Advanced Computing & Communication Systems","first-page":"323","article-title":"Redactable blockchain using enhanced chameleon hash function","author":"Ashritha","year":"2019"},{"key":"10.1016\/j.hcc.2024.100281_b5","series-title":"IEEE INFOCOM 2021-IEEE Conference on Computer Communications","first-page":"1","article-title":"PROCESS: Privacy-preserving on-chain certificate status service","author":"Jia","year":"2021"},{"issue":"1","key":"10.1016\/j.hcc.2024.100281_b6","article-title":"General data protection regulation (GDPR)","volume":"24","author":"Regulation","year":"2018","journal-title":"Intersoft Consulting"},{"key":"10.1016\/j.hcc.2024.100281_b7","series-title":"2017 IEEE European Symposium on Security and Privacy (EuroS&P)","first-page":"111","article-title":"Redactable blockchain\u2013or\u2013rewriting history in bitcoin and friends","author":"Ateniese","year":"2017"},{"key":"10.1016\/j.hcc.2024.100281_b8","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.future.2021.07.035","article-title":"Scalable blockchains\u2014A systematic review","volume":"126","author":"Nasir","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"year":"2023","series-title":"Enhancing editability in permissionless blockchain: A three-chain model for efficiency and ledger consistency","author":"Lei","key":"10.1016\/j.hcc.2024.100281_b9"},{"key":"10.1016\/j.hcc.2024.100281_b10","series-title":"2019 IEEE Symposium on Security and Privacy","first-page":"124","article-title":"Redactable blockchain in the permissionless setting","author":"Deuber","year":"2019"},{"issue":"5","key":"10.1016\/j.hcc.2024.100281_b11","doi-asserted-by":"crossref","first-page":"3699","DOI":"10.1109\/TDSC.2022.3212601","article-title":"Escaping from consensus: Instantly redactable blockchain protocols in permissionless setting","volume":"20","author":"Li","year":"2023","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.hcc.2024.100281_b12","series-title":"International Conference on Financial Cryptography and Data Security","first-page":"37","article-title":"Reparo: Publicly verifiable layer to repair blockchains","author":"Thyagarajan","year":"2021"},{"key":"10.1016\/j.hcc.2024.100281_b13","article-title":"Chameleon hashing and signatures","volume":"010","author":"Krawczyk","year":"1998","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100281_b14","article-title":"Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based","volume":"406","author":"Derler","year":"2019","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100281_b15","doi-asserted-by":"crossref","first-page":"4507","DOI":"10.1109\/TIFS.2021.3107146","article-title":"K-time modifiable and epoch-based redactable blockchain","volume":"16","author":"Xu","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2024.100281_b16","doi-asserted-by":"crossref","first-page":"1756","DOI":"10.1109\/TIFS.2023.3340917","article-title":"Accountable fine-grained blockchain rewriting in the permissionless setting","volume":"19","author":"Tian","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2024.100281_b17","series-title":"Proceedings of the 26th ACM Symposium on Access Control Models and Technologies","first-page":"103","article-title":"ReTRACe:Revocable and traceable blockchain rewrites using attribute-based cryptosystems","author":"Panwar","year":"2021"},{"key":"10.1016\/j.hcc.2024.100281_b18","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s00145-003-0052-4","article-title":"Separating decision Diffie\u2013Hellman from computational diffie\u2013hellman in cryptographic groups","volume":"16","author":"Joux","year":"2003","journal-title":"J. Cryptol."},{"key":"10.1016\/j.hcc.2024.100281_b19","series-title":"2018 Crypto Valley Conference on Blockchain Technology","first-page":"1","article-title":"A scale-out blockchain for value transfer with spontaneous sharding","author":"Ren","year":"2018"},{"key":"10.1016\/j.hcc.2024.100281_b20","article-title":"Threshold signatures with private accountability","author":"Boneh","year":"2022","journal-title":"Cryptology ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100281_b21","series-title":"Advances in Cryptology\u2014CRYPTO\u201989 Proceedings 9","first-page":"239","article-title":"Efficient identification and signatures for smart cards","author":"Schnorr","year":"1990"},{"issue":"4","key":"10.1016\/j.hcc.2024.100281_b22","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ElGamal","year":"1985","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/j.hcc.2024.100281_b23","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"281","article-title":"The bitcoin backbone protocol: Analysis and applications","author":"Garay","year":"2015"},{"key":"10.1016\/j.hcc.2024.100281_b24","series-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","first-page":"931","article-title":"Rapidchain: Scaling blockchain via full sharding","author":"Zamani","year":"2018"},{"key":"10.1016\/j.hcc.2024.100281_b25","series-title":"Annual International Cryptology Conference","first-page":"357","article-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol","author":"Kiayias","year":"2017"},{"key":"10.1016\/j.hcc.2024.100281_b26","series-title":"2020 IEEE International Conference on Progress in Informatics and Computing","first-page":"304","article-title":"Block proposer election method based on verifiable random function in consensus mechanism","author":"Wang","year":"2020"},{"issue":"5","key":"10.1016\/j.hcc.2024.100281_b27","first-page":"501","article-title":"Research on fault-correcting blockchain technology","volume":"5","author":"Li","year":"2018","journal-title":"J. Cryptol. Res."},{"key":"10.1016\/j.hcc.2024.100281_b28","doi-asserted-by":"crossref","first-page":"2771","DOI":"10.1109\/TIFS.2022.3192716","article-title":"Redactable blockchain from decentralized chameleon hash functions","volume":"17","author":"Jia","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2024.100281_b29","doi-asserted-by":"crossref","first-page":"1653","DOI":"10.1109\/TIFS.2023.3245406","article-title":"Wolverine: A scalable and transaction-consistent redactable permissionless blockchain","volume":"18","author":"Li","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.hcc.2024.100281_b30","doi-asserted-by":"crossref","first-page":"1972","DOI":"10.1109\/TETC.2019.2949510","article-title":"Blockchain mutability: Challenges and proposed solutions","volume":"9","author":"Politou","year":"2019","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.hcc.2024.100281_b31","series-title":"Advances in Cryptology\u2014EUROCRYPT\u201996: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12\u201316, 1996 Proceedings 15","first-page":"354","article-title":"Robust threshold DSS signatures","author":"Gennaro","year":"1996"},{"issue":"3","key":"10.1016\/j.hcc.2024.100281_b32","doi-asserted-by":"crossref","first-page":"1669","DOI":"10.1109\/TNSE.2022.3233448","article-title":"A survey on redactable blockchain: challenges and opportunities","volume":"10","author":"Ye","year":"2023","journal-title":"IEEE Trans. Netw. Sci. Eng."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000849?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000849?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T04:28:33Z","timestamp":1758688113000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295224000849"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["S2667295224000849"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100281","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Redactable Blockchain from Accountable Weight Threshold Chameleon Hash","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100281","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100281"}}