{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:03Z","timestamp":1773511203710,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427247","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"813-828","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability"],"prefix":"10.1145","author":[{"given":"Yangguang","family":"Tian","sequence":"first","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Nan","family":"Li","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"University of Oregon, USA"}]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Accenture. https:\/\/www.accenture.com\/sg-en.  [n.d.]. Accenture. https:\/\/www.accenture.com\/sg-en."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Accountable Blockchain Rewriting. https:\/\/github.com\/SMC-SMU\/Accountable-Blockchain-Rewriting.  [n.d.]. Accountable Blockchain Rewriting. https:\/\/github.com\/SMC-SMU\/Accountable-Blockchain-Rewriting."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. BLS12-381. https:\/\/tools.ietf.org\/html\/draft-yonezawa-pairing-friendly-curves-02.  [n.d.]. BLS12-381. https:\/\/tools.ietf.org\/html\/draft-yonezawa-pairing-friendly-curves-02."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. General Data Protection Regulation. https:\/\/eugdpr.org.  [n.d.]. General Data Protection Regulation. https:\/\/eugdpr.org."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Hyperledger. https:\/\/www.hyperledger.org.  [n.d.]. Hyperledger. https:\/\/www.hyperledger.org."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Pairing-Friendly Curves. https:\/\/tools.ietf.org\/id\/draft-yonezawa-pairing-friendly-curves-01.html.  [n.d.]. Pairing-Friendly Curves. https:\/\/tools.ietf.org\/id\/draft-yonezawa-pairing-friendly-curves-01.html."},{"key":"e_1_3_2_1_7_1","unstructured":"[n.d.]. Ripple. https:\/\/ripple.com.  [n.d.]. Ripple. https:\/\/ripple.com."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Michel Abdalla Mihir Bellare Dario Catalano Eike Kiltz Tadayoshi Kohno Tanja Lange John Malone-Lee Gregory Neven Pascal Paillier and Haixia Shi. 2005. Searchable encryption revisited: Consistency properties relation to anonymous IBE and extensions. In CRYPTO. 205\u2013222.  Michel Abdalla Mihir Bellare Dario Catalano Eike Kiltz Tadayoshi Kohno Tanja Lange John Malone-Lee Gregory Neven Pascal Paillier and Haixia Shi. 2005. Searchable encryption revisited: Consistency properties relation to anonymous IBE and extensions. In CRYPTO. 205\u2013222.","DOI":"10.1007\/11535218_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Shashank Agrawal and Melissa Chase. 2017. FAME: fast attribute-based message encryption. In CCS. 665\u2013682.  Shashank Agrawal and Melissa Chase. 2017. FAME: fast attribute-based message encryption. In CCS. 665\u2013682.","DOI":"10.1145\/3133956.3134014"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Giuseppe Ateniese Bernardo Magri Daniele Venturi and Ewerton Andrade. 2017. Redactable blockchain\u2013or\u2013rewriting history in bitcoin and friends. In EuroS&P. 111\u2013126.  Giuseppe Ateniese Bernardo Magri Daniele Venturi and Ewerton Andrade. 2017. Redactable blockchain\u2013or\u2013rewriting history in bitcoin and friends. In EuroS&P. 111\u2013126.","DOI":"10.1109\/EuroSP.2017.37"},{"key":"e_1_3_2_1_13_1","volume-title":"Ciphertext-Policy Attribute-Based Encryption","author":"Bethencourt John","unstructured":"John Bethencourt , Amit Sahai , and Brent Waters . 2007. Ciphertext-Policy Attribute-Based Encryption . In IEEE S &P. 321\u2013334. John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In IEEE S&P. 321\u2013334."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Xavier Boyen and Eu-Jin Goh. 2005. Hierarchical identity based encryption with constant size ciphertext. In CRYPTO. 440\u2013456.  Dan Boneh Xavier Boyen and Eu-Jin Goh. 2005. Hierarchical identity based encryption with constant size ciphertext. In CRYPTO. 440\u2013456.","DOI":"10.1007\/11426639_26"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Moni Naor. 2008. Traitor tracing with constant size ciphertext. In CCS. 501\u2013510.  Dan Boneh and Moni Naor. 2008. Traitor tracing with constant size ciphertext. In CCS. 501\u2013510.","DOI":"10.1145\/1455770.1455834"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Amit Sahai and Brent Waters. 2006. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT. 573\u2013592.  Dan Boneh Amit Sahai and Brent Waters. 2006. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT. 573\u2013592.","DOI":"10.1007\/11761679_34"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Brent Waters. 2006. A fully collusion resistant broadcast trace and revoke system. In CCS. 211\u2013220.  Dan Boneh and Brent Waters. 2006. A fully collusion resistant broadcast trace and revoke system. In CCS. 211\u2013220.","DOI":"10.1145\/1180405.1180432"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch David Derler Stephan Krenn Henrich\u00a0C P\u00f6hls Kai Samelin and Daniel Slamanig. 2017. Chameleon-hashes with ephemeral trapdoors. In PKC. 152\u2013182.  Jan Camenisch David Derler Stephan Krenn Henrich\u00a0C P\u00f6hls Kai Samelin and Daniel Slamanig. 2017. Chameleon-hashes with ephemeral trapdoors. In PKC. 152\u2013182.","DOI":"10.1007\/978-3-662-54388-7_6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Ran Canetti Benjamin Fuller Omer Paneth Leonid Reyzin and Adam Smith. 2016. Reusable fuzzy extractors for low-entropy distributions. In EUROCRYPT. 117\u2013146.  Ran Canetti Benjamin Fuller Omer Paneth Leonid Reyzin and Adam Smith. 2016. Reusable fuzzy extractors for low-entropy distributions. In EUROCRYPT. 117\u2013146.","DOI":"10.1007\/978-3-662-49890-3_5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Jie Chen Romain Gay and Hoeteck Wee. 2015. Improved dual system ABE in prime-order groups via predicate encodings. In EUROCRYPT. 595\u2013624.  Jie Chen Romain Gay and Hoeteck Wee. 2015. Improved dual system ABE in prime-order groups via predicate encodings. In EUROCRYPT. 595\u2013624.","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Benny Chor Amos Fiat and Moni Naor. 1994. Tracing traitors. In CRYPTO. 257\u2013270.  Benny Chor Amos Fiat and Moni Naor. 1994. Tracing traitors. In CRYPTO. 257\u2013270.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"David Derler Kai Samelin Daniel Slamanig and Christoph Striecks. 2019. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. In NDSS.  David Derler Kai Samelin Daniel Slamanig and Christoph Striecks. 2019. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. In NDSS.","DOI":"10.14722\/ndss.2019.23066"},{"key":"e_1_3_2_1_24_1","volume-title":"Redactable blockchain in the permissionless setting","author":"Deuber Dominic","unstructured":"Dominic Deuber , Bernardo Magri , and Sri Aravinda\u00a0Krishnan Thyagarajan . 2019. Redactable blockchain in the permissionless setting . In IEEE S &P. 124\u2013138. Dominic Deuber, Bernardo Magri, and Sri Aravinda\u00a0Krishnan Thyagarajan. 2019. Redactable blockchain in the permissionless setting. In IEEE S&P. 124\u2013138."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"L\u00e9o Ducas. 2010. Anonymity from asymmetry: New constructions for anonymous HIBE. In CT-RSA. 148\u2013164.  L\u00e9o Ducas. 2010. Anonymity from asymmetry: New constructions for anonymous HIBE. In CT-RSA. 148\u2013164.","DOI":"10.1007\/978-3-642-11925-5_11"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Amos Fiat and Moni Naor. 1993. Broadcast encryption. In CRYPTO. 480\u2013491.  Amos Fiat and Moni Naor. 1993. Broadcast encryption. In CRYPTO. 480\u2013491.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure information networks. 258\u2013272.  Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure information networks. 258\u2013272.","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"e_1_3_2_1_28_1","volume-title":"Analysis of an electronic voting system","author":"Kohno Tadayoshi","unstructured":"Tadayoshi Kohno , Adam Stubblefield , Aviel\u00a0 D Rubin , and Dan\u00a0 S Wallach . 2004. Analysis of an electronic voting system . In IEEE S &P. 27\u201340. Tadayoshi Kohno, Adam Stubblefield, Aviel\u00a0D Rubin, and Dan\u00a0S Wallach. 2004. Analysis of an electronic voting system. In IEEE S&P. 27\u201340."},{"key":"e_1_3_2_1_29_1","unstructured":"Hugo Krawczyk and Tal Rabin. 2000. Chameleon Signatures. In NDSS.  Hugo Krawczyk and Tal Rabin. 2000. Chameleon Signatures. In NDSS."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Junzuo Lai and Qiang Tang. 2018. Making any attribute-based encryption accountable efficiently. In ESORICS. 527\u2013547.  Junzuo Lai and Qiang Tang. 2018. Making any attribute-based encryption accountable efficiently. In ESORICS. 527\u2013547.","DOI":"10.1007\/978-3-319-98989-1_26"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Allison Lewko and Brent Waters. 2012. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO. 180\u2013198.  Allison Lewko and Brent Waters. 2012. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO. 180\u2013198.","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Zhen Liu Zhenfu Cao and Duncan\u00a0S Wong. 2013. Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. In CCS. 475\u2013486.  Zhen Liu Zhenfu Cao and Duncan\u00a0S Wong. 2013. Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. In CCS. 475\u2013486.","DOI":"10.1145\/2508859.2516683"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Takahiro Matsuda Kenta Takahashi Takao Murakami and Goichiro Hanaoka. 2016. Fuzzy signatures: relaxing requirements and a new construction. In ACNS. 97\u2013116.  Takahiro Matsuda Kenta Takahashi Takao Murakami and Goichiro Hanaoka. 2016. Fuzzy signatures: relaxing requirements and a new construction. In ACNS. 97\u2013116.","DOI":"10.1007\/978-3-319-39555-5_6"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Roman Matzutt Jens Hiller Martin Henze Jan\u00a0Henrik Ziegeldorf Dirk M\u00fcllmann Oliver Hohlfeld and Klaus Wehrle. 2018. A quantitative analysis of the impact of arbitrary blockchain content on bitcoin. In FC. 420\u2013438.  Roman Matzutt Jens Hiller Martin Henze Jan\u00a0Henrik Ziegeldorf Dirk M\u00fcllmann Oliver Hohlfeld and Klaus Wehrle. 2018. A quantitative analysis of the impact of arbitrary blockchain content on bitcoin. In FC. 420\u2013438.","DOI":"10.1007\/978-3-662-58387-6_23"},{"key":"e_1_3_2_1_35_1","volume-title":"Poster: I don\u2019t want that content! on the risks of exploiting bitcoin\u2019s blockchain as a content store. In CCS. 1769\u20131771.","author":"Matzutt Roman","year":"2016","unstructured":"Roman Matzutt , Oliver Hohlfeld , Martin Henze , Robin Rawiel , Jan\u00a0Henrik Ziegeldorf , and Klaus Wehrle . 2016 . Poster: I don\u2019t want that content! on the risks of exploiting bitcoin\u2019s blockchain as a content store. In CCS. 1769\u20131771. Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan\u00a0Henrik Ziegeldorf, and Klaus Wehrle. 2016. Poster: I don\u2019t want that content! on the risks of exploiting bitcoin\u2019s blockchain as a content store. In CCS. 1769\u20131771."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Ralph\u00a0C Merkle. 1989. A certified digital signature. In CRYPTO. 218\u2013238.  Ralph\u00a0C Merkle. 1989. A certified digital signature. In CRYPTO. 218\u2013238.","DOI":"10.1007\/0-387-34805-0_21"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Atsuko Miyaji Masaki Nakabayashi and Shunzo Takano. 2000. Characterization of elliptic curve traces under FR-reduction. In ICISC. 90\u2013108.  Atsuko Miyaji Masaki Nakabayashi and Shunzo Takano. 2000. Characterization of elliptic curve traces under FR-reduction. In ICISC. 90\u2013108.","DOI":"10.1007\/3-540-45247-8_8"},{"key":"e_1_3_2_1_38_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Jianting Ning Zhenfu Cao Xiaolei Dong Junqing Gong and Jie Chen. 2016. Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently. In ESORICS. 551\u2013569.  Jianting Ning Zhenfu Cao Xiaolei Dong Junqing Gong and Jie Chen. 2016. Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently. In ESORICS. 551\u2013569.","DOI":"10.1007\/978-3-319-45741-3_28"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Yannis Rouselakis and Brent Waters. 2013. Practical constructions and new proof methods for large universe attribute-based encryption. In CCS. 463\u2013474.  Yannis Rouselakis and Brent Waters. 2013. Practical constructions and new proof methods for large universe attribute-based encryption. In CCS. 463\u2013474.","DOI":"10.1145\/2508859.2516672"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Kai Samelin and Daniel Slamanig. 2020. Policy-Based Sanitizable Signatures. In CT-RSA. 538\u2013563.  Kai Samelin and Daniel Slamanig. 2020. Policy-Based Sanitizable Signatures. In CT-RSA. 538\u2013563.","DOI":"10.1007\/978-3-030-40186-3_23"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_43_1","volume-title":"Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.Iacr Cryptology Eprint Archive 2011","author":"Seo Jae\u00a0Hong","year":"2011","unstructured":"Jae\u00a0Hong Seo and Jung\u00a0Hee Cheon . 2011. Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.Iacr Cryptology Eprint Archive 2011 ( 2011 ), 21. Jae\u00a0Hong Seo and Jung\u00a0Hee Cheon. 2011. Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.Iacr Cryptology Eprint Archive 2011 (2011), 21."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Victor Shoup. 1997. Lower bounds for discrete logarithms and related problems. In EUROCRYPT. 256\u2013266.  Victor Shoup. 1997. Lower bounds for discrete logarithms and related problems. In EUROCRYPT. 256\u2013266.","DOI":"10.1007\/3-540-69053-0_18"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346330.1346335"},{"key":"e_1_3_2_1_46_1","first-page":"92","article-title":"Cryptocurrencies\u2014a forensic challenge or opportunity for law enforcement? an interpol perspective","volume":"16","author":"Tziakouris Giannis","year":"2018","unstructured":"Giannis Tziakouris . 2018 . Cryptocurrencies\u2014a forensic challenge or opportunity for law enforcement? an interpol perspective . IEEE S&P 16 , 4 (2018), 92 \u2013 94 . Giannis Tziakouris. 2018. Cryptocurrencies\u2014a forensic challenge or opportunity for law enforcement? an interpol perspective. IEEE S&P 16, 4 (2018), 92\u201394.","journal-title":"IEEE S&P"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427247","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":45,"alternative-id":["10.1145\/3427228.3427247","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427247","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}