{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:26:40Z","timestamp":1772083600323,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62232004"],"award-info":[{"award-number":["62232004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1109\/jiot.2023.3279434","type":"journal-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T17:45:37Z","timestamp":1684950337000},"page":"21203-21216","source":"Crossref","is-referenced-by-count":14,"title":["Fine-Grained Redactable Blockchain Using Trapdoor-Hash"],"prefix":"10.1109","volume":"10","author":[{"given":"Guohao","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Software and BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2807-2597","authenticated-orcid":false,"given":"Xuan","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Software and BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7793-8310","authenticated-orcid":false,"given":"Haoxuan","family":"Han","sequence":"additional","affiliation":[{"name":"School of Software and BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3923-1351","authenticated-orcid":false,"given":"Ao","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2021.9010065"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2005.29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14081-5_13"},{"key":"ref5","first-page":"251","article-title":"Secret sharing homomorphisms: Keeping shares of a secret secret","volume-title":"Proc. Conf. Theory Appl. Cryptograph. Techn.","author":"Benaloh"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111243"},{"key":"ref7","volume-title":"Data Protection: A Practical Guide to U.K. and EU Law","author":"Carey","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/JFRC-08-2016-0068"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1515\/eplj-2017-0022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2018.06.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.01.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2018.00070"},{"key":"ref14","article-title":"Rollerchain, a blockchain with safely pruneable full blocks","author":"Chepurnoy","year":"2016","journal-title":"arXiv:1603.07926"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00047"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.25"},{"key":"ref17","article-title":"\u03bcchain: How to forget without hard forks","author":"Puddu","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00039"},{"key":"ref19","article-title":"Redactable proof-of-stake blockchain with fast confirmation","author":"Xu","year":"2019"},{"key":"ref20","article-title":"Reparo: Publicly verifiable layer to repair blockchains","author":"Thyagarajan","year":"2020","journal-title":"arXiv:2001.00486"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.37"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728524"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.028"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2901011"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2943331"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23066"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956628"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/356789.356793"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335757"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54388-7_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427247"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/23799927.2020.1842808"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.026"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4485311"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3162499"},{"key":"ref41","first-page":"305","article-title":"In search of an understandable consensus algorithm","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Ongaro"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_47"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10353047\/10133822.pdf?arnumber=10133822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T01:17:46Z","timestamp":1703035066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133822\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":45,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3279434","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,15]]}}}