{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:55:53Z","timestamp":1775598953054,"version":"3.50.1"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>Blockchain and distributed ledger technology started as a decentralized infrastructure to enable and manage digital currency like Bitcoin without relying on a central authority. One of the attractive features provided by blockchain technology is its append-only \u201cimmutability\u201d feature, which means the stored data cannot be modified or manipulated by any means once it is validated in the blockchain ledger. Such immutability helps traceability, auditing, and non-repudiation, which builds decentralized trust among un-trusted parties. Despite that, immutability if misused could lead to the permanent existence of sensitive information and misinformation in the blockchain. Incidents like broadcasting illegal content have already taken their place in blockchain systems. Such incidents call for prompt solutions for mitigation. One emerging research theme, \u201credactable distributed ledgers\u201d such as redactable blockchain provides approaches for modifying ledgers with certain controllability. This article aims to survey the current research landscape about redactable distributed ledgers. We will first describe the motivations behind redactable distributed ledgers. Compared to other relevant surveys, we comprehensively summarized and briefly explained the underlying technologies for supporting redactable distributed ledgers. We mainly focused on chameleon hash-based redactable blockchain structure and classifications, with detailed comparisons and illustrations. Further, we tackled new distributed ledger structures, including the new state-of-the-art block matrix structure. Furthermore, new applications that can be enabled by redactable distributed ledgers and future research directions are discussed in detail. This article emphasizes the motivation of utilizing the redactable distributed ledgers in several critical applications to mitigate misuse of immutability features threatening the original known design of distributed ledgers.<\/jats:p>","DOI":"10.1145\/3596224","type":"journal-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T11:34:10Z","timestamp":1685014450000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Redactable Distributed Ledgers: A Survey"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0317-5733","authenticated-orcid":false,"given":"Efat","family":"Fathalla","sequence":"first","affiliation":[{"name":"Old Dominion University and InterDigital Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6691-5233","authenticated-orcid":false,"given":"Chonggang","family":"Wang","sequence":"additional","affiliation":[{"name":"InterDigital Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1918-149X","authenticated-orcid":false,"given":"Xu","family":"Li","sequence":"additional","affiliation":[{"name":"InterDigital Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3523-8978","authenticated-orcid":false,"given":"Robert","family":"Gazda","sequence":"additional","affiliation":[{"name":"InterDigital Inc., USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6112-9313","authenticated-orcid":false,"given":"Hongyi","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Arizona, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,18]]},"reference":[{"key":"e_1_3_1_2_2","article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Business Review. Retrieved from https:\/\/bitcoin.org\/bitcoin.pdf.","journal-title":"Decentralized Business Review"},{"key":"e_1_3_1_3_2","article-title":"Ethereum Whitepaper","year":"2014","unstructured":"Ethereum. 2014. Ethereum Whitepaper. Retrieved April 27, 2022 from https:\/\/ethereum.org\/.","journal-title":"https:\/\/ethereum.org\/"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190517"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3050241"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2914052"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASS50613.2020.00082"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55605-0_25"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078542.3078552"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00022"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.4018\/JCIT.2019010102"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.22502"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2986041"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2943331"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322167"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.016"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.06.068"},{"key":"e_1_3_1_18_2","article-title":"Blockchain mutability: Challenges and proposed solutions","author":"Politou Eugenia","year":"2019","unstructured":"Eugenia Politou, Fran Casino, Efthymios Alepis, and Constantinos Patsakis. 2019. Blockchain mutability: Challenges and proposed solutions. IEEE Trans. Emerg. Top. Comput. (2019).","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/LADC53747.2021.9672577"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524104"},{"key":"e_1_3_1_21_2","first-page":"152","volume-title":"IACR International Workshop on Public Key Cryptography","author":"Camenisch Jan","year":"2017","unstructured":"Jan Camenisch, David Derler, Stephan Krenn, Henrich C. P\u00f6hls, Kai Samelin, and Daniel Slamanig. 2017. Chameleon-hashes with ephemeral trapdoors. In IACR International Workshop on Public Key Cryptography. Springer, 152\u2013182."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89339-6_2"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2019.2898162"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3282373.3282396"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-8775-3_8"},{"key":"e_1_3_1_27_2","article-title":"A Data Structure for Integrity Protection with Erasure Capability","author":"Kuhn D. Richard","year":"2018","unstructured":"D. Richard Kuhn et\u00a0al. 2018. A Data Structure for Integrity Protection with Erasure Capability. NIST Cybersecurity Whitepaper.","journal-title":"NIST Cybersecurity Whitepaper"},{"key":"e_1_3_1_28_2","unstructured":"Hugo Krawczyk and Tal Rabin. 1998. Chameleon Hashing and Signatures . https:\/\/eprint.iacr.org\/1998\/010."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288108"},{"key":"e_1_3_1_30_2","article-title":"Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based","author":"Derler David","year":"2019","unstructured":"David Derler, Kai Samelin, Daniel Slamanig, and Christoph Striecks. 2019. Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based. Cryptol. ePrint Arch. (2019).","journal-title":"Cryptol. ePrint Arch."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.020"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3156808"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3107146"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2019.8728524"},{"key":"e_1_3_1_35_2","article-title":"mu chain: How to forget without hard forks","author":"Puddu Ivan","year":"2017","unstructured":"Ivan Puddu, Alexandra Dmitrienko, and Srdjan Capkun. 2017. mu chain: How to forget without hard forks. Cryptol. ePrint Arch. (2017).","journal-title":"Cryptol. ePrint Arch."},{"key":"e_1_3_1_36_2","volume-title":"Procedures for the Management of the Telecommunications Numbering Space in the ETSI Operational Area","year":"2004","unstructured":"ETSI. 2004. Procedures for the Management of the Telecommunications Numbering Space in the ETSI Operational Area. Technical Report ETSI PDL 012. ETSI."},{"key":"e_1_3_1_37_2","volume-title":"Permissioned Distributed Ledgers (PDLs); Overview and Principles","author":"Ledgers ETSI Industry Specification Group for Permissioned Distributed","year":"2021","unstructured":"ETSI Industry Specification Group for Permissioned Distributed Ledgers. 2021. Permissioned Distributed Ledgers (PDLs); Overview and Principles. ETSI Group Report GR PDL 018. ETSI."},{"issue":"11","key":"e_1_3_1_38_2","first-page":"7972","article-title":"DT-SSIM: A decentralized trustworthy self-sovereign identity management framework","volume":"9","author":"Samir Efat","year":"2021","unstructured":"Efat Samir, Hongyi Wu, Mohamed Azab, Chunsheng Xin, and Qiao Zhang. 2021. DT-SSIM: A decentralized trustworthy self-sovereign identity management framework. IEEE IoT J. 9, 11 (2021), 7972\u20137988.","journal-title":"IEEE IoT J."},{"issue":"2016","key":"e_1_3_1_39_2","first-page":"18","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"Tobin Andrew","year":"2016","unstructured":"Andrew Tobin and Drummond Reed. 2016. The inevitable rise of self-sovereign identity. Sovrin Found. 29, 2016 (2016), 18.","journal-title":"Sovrin Found."},{"key":"e_1_3_1_40_2","unstructured":"Decentralized identifiers (DIDs) v1.0. ([n. d.]). Retrieved from https:\/\/www.w3.org\/TR\/did-core\/."},{"key":"e_1_3_1_41_2","article-title":"A Protocol and Token for Self-sovereign Identity and Decentralized Trust","author":"Windley P.","year":"2018","unstructured":"P. Windley and Reed D. Sovrin. 2018. A Protocol and Token for Self-sovereign Identity and Decentralized Trust. Sovrin Foundation, Utah.","journal-title":"Sovrin Foundation"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TELSIKS52058.2021.9606300"},{"key":"e_1_3_1_43_2","article-title":"Blockchain-guided dynamic best-relay selection for trustworthy vehicular communication","author":"Ghourab Esraa M.","year":"2021","unstructured":"Esraa M. Ghourab, Mohamed Azab, and Noha Ezzeldin. 2021. Blockchain-guided dynamic best-relay selection for trustworthy vehicular communication. IEEE Trans. Intell. Transport. Syst. (2021).","journal-title":"IEEE Trans. Intell. Transport. Syst."},{"key":"e_1_3_1_44_2","article-title":"Blockchain-enabled network sharing for O-RAN","author":"Giupponi Lorenza","year":"2021","unstructured":"Lorenza Giupponi and Francesc Wilhelmi. 2021. Blockchain-enabled network sharing for O-RAN. arXiv:2107.02005. Retrieved from https:\/\/arxiv.org\/abs\/2107.02005.","journal-title":"arXiv:2107.02005"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC50174.2021.9569375"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766375"},{"key":"e_1_3_1_47_2","article-title":"A survey on metaverse: Fundamentals, security, and privacy","author":"Wang Yuntao","year":"2022","unstructured":"Yuntao Wang, Zhou Su, Ning Zhang, Dongxiao Liu, Rui Xing, Tom H. Luan, and Xuemin Shen. 2022. A survey on metaverse: Fundamentals, security, and privacy. arXiv:2203.02662. Retrieved from https:\/\/arxiv.org\/abs\/2203.02662.","journal-title":"arXiv:2203.02662"},{"key":"e_1_3_1_48_2","article-title":"Metachain: A novel blockchain-based framework for metaverse applications","author":"Nguyen Cong T.","year":"2021","unstructured":"Cong T. Nguyen, Dinh Thai Hoang, Diep N. Nguyen, and Eryk Dutkiewicz. 2021. Metachain: A novel blockchain-based framework for metaverse applications. arXiv:2201.00759. Retrieved from https:\/\/arxiv.org\/abs\/2201.00759.","journal-title":"arXiv:2201.00759"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596224","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3596224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:58Z","timestamp":1750178878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3596224"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,18]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3596224"],"URL":"https:\/\/doi.org\/10.1145\/3596224","relation":{},"ISSN":["2769-6472","2769-6480"],"issn-type":[{"value":"2769-6472","type":"print"},{"value":"2769-6480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,18]]},"assertion":[{"value":"2022-09-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}