{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:26:12Z","timestamp":1772083572082,"version":"3.50.1"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Union\u2019s Horizon 2020 research and innovation programme","doi-asserted-by":"publisher","award":["780477"],"award-info":[{"award-number":["780477"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tnsm.2022.3214279","type":"journal-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T19:41:45Z","timestamp":1665603705000},"page":"3872-3883","source":"Crossref","is-referenced-by-count":7,"title":["Towards Data Redaction in Bitcoin"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0557-9969","authenticated-orcid":false,"given":"Vincenzo","family":"Botta","sequence":"first","affiliation":[{"name":"DIEM, University of Salerno, Fisciano, Italy"}]},{"given":"Vincenzo","family":"Iovino","sequence":"additional","affiliation":[{"name":"Aragon ZK Research Guild, Aragon Association, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2381-5846","authenticated-orcid":false,"given":"Ivan","family":"Visconti","sequence":"additional","affiliation":[{"name":"DIEM, University of Salerno, Fisciano, Italy"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66172-4_23"},{"key":"ref24","year":"2022","journal-title":"Secure Hash Standard (SHS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/23799927.2020.1842808"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795284959"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00047"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_2"},{"key":"ref21","first-page":"311","article-title":"Improved efficient arguments (preliminary version)","volume":"963","author":"kilian","year":"1995","journal-title":"Proc Crypto"},{"key":"ref2","first-page":"420","article-title":"A quantitative analysis of the impact of arbitrary blockchain content on bitcoin","author":"matzutt","year":"2018","journal-title":"Financial Cryptography and Data Security"},{"key":"ref1","author":"nakamoto","year":"2009","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_23"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_28"},{"key":"ref19","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","volume":"263","author":"fiat","year":"1986","journal-title":"Proc Crypto"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"ref8","author":"puddu","year":"2017","journal-title":"?chain How to forget without hard forks"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.37"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00039"},{"key":"ref4","author":"schneier","year":"2022","journal-title":"Illegal content and the blockchain"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2019.00007"},{"key":"ref6","year":"2022","journal-title":"Scripta"},{"key":"ref5","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10034788\/09917482.pdf?arnumber=9917482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:09:04Z","timestamp":1676934544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9917482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":24,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3214279","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}