{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T11:11:07Z","timestamp":1772536267375,"version":"3.50.1"},"reference-count":15,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"published-print":{"date-parts":[[2021,1,2]]},"DOI":"10.1080\/23799927.2020.1842808","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T16:32:22Z","timestamp":1603902742000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":15,"title":["RSA and redactable blockchains"],"prefix":"10.1080","volume":"6","author":[{"given":"Dima","family":"Grigoriev","sequence":"first","affiliation":[{"name":"CNRS, Math\u00e9matiques, Universit\u00e9 de Lille, Lille, Villeneuve d'Ascq, France"}]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The City College of New York, New York, NY, USA"}]}],"member":"301","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"G. Ateniese, B. Magri, D. Venturi, and E. Andrade, Redactable blockchain \u2013 or \u2013 rewriting history in bitcoin and friends, 2017 IEEE European Symposium on Security and Privacy, INSPEC Accession Number: 17011479. Available at https:\/\/eprint.iacr.org\/2016\/757.pdf","DOI":"10.1109\/EuroSP.2017.37"},{"key":"CIT0002","unstructured":"J. Benaloh, Dense probabilistic encryption, First Ann. Workshop on Selected Areas in Cryptology, 1994, pp. 120\u2013128."},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"D. Derler, K. Samelin, D. Slamanig, and C. Striecks, Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based, Network and Distributed Systems Security (NDSS 2019).","DOI":"10.14722\/ndss.2019.23066"},{"key":"CIT0004","doi-asserted-by":"crossref","unstructured":"D. Deuber, B. Magri, and S.A.K. Thyagarajan, Redactable blockchain in the permissionless setting, 2019 IEEE Symposium on Security and Privacy, pp. 124\u2013138. Available at https:\/\/arxiv.org\/abs\/1901.03206.","DOI":"10.1109\/SP.2019.00039"},{"key":"CIT0005","unstructured":"Downside of bitcoin: A ledger that can't be corrected, The New York Times, 2016. Available at https:\/\/tinyurl.com\/ydxjlf9e."},{"key":"CIT0006","first-page":"333","volume":"7","author":"von zur Gathen J.","year":"2013","journal-title":"J. Math. Cryptol."},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-006-0005-x"},{"key":"CIT0009","unstructured":"H. Krawczyk and T. Rabin, Chameleon signatures, Network and Distributed System Security Symposium (NDSS 2000)."},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"S. Krenn, H.C. P\u00f6hls, K. Samelin, and D. Slamanig, Chameleon-hashes with dual long-term trapdoors and their applications, in Progress in Cryptology \u2013 AFRICACRYPT 2018, Lecture Notes Comp. Sci. 10831, pp. 11\u201332, Springer.","DOI":"10.1007\/978-3-319-89339-6_2"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"R.C. Merkle, A digital signature based on a conventional encryption function, in Advances in Cryptology \u2013 CRYPTO '87, Lecture Notes Comp. Sci. 293, 1987, pp. 369\u2013378, Springer.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"CIT0012","unstructured":"I. Puddu, A. Dmitrienko, and S. Capkun, \u03bcchain: How to forget without hard forks, preprint. Available at https:\/\/eprint.iacr.org\/2017\/106.pdf."},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"CIT0014","unstructured":"Secure Hash Standard (SHS), Available at https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180-4.pdf."},{"key":"CIT0015","first-page":"17","volume":"9","author":"Yang F.-Y.","year":"2009","journal-title":"Int. J. Network Security"}],"container-title":["International Journal of Computer Mathematics: Computer Systems Theory"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/23799927.2020.1842808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T05:12:40Z","timestamp":1618981960000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23799927.2020.1842808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1,2]]}},"alternative-id":["10.1080\/23799927.2020.1842808"],"URL":"https:\/\/doi.org\/10.1080\/23799927.2020.1842808","relation":{},"ISSN":["2379-9927","2379-9935"],"issn-type":[{"value":"2379-9927","type":"print"},{"value":"2379-9935","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcom20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-06-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-28","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}