Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption

Yueyan Dong , Yifang Li , Ye Cheng , Dongxiao Yu

High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (1) : 100168

PDF (1870KB)
High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (1) : 100168 DOI: 10.1016/j.hcc.2023.100168
Research Articles
research-article

Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption

Author information +
History +
PDF (1870KB)

Abstract

A redactable blockchain allows authorized individuals to remove or replace undesirable content, offering the ability to remove illegal or unwanted information. Access control is a mechanism that limits data visibility and ensures that only authorized users can decrypt and access encrypted information, playing a crucial role in addressing privacy concerns and securing the data stored on a blockchain. Redactability and access control are both essential components when implementing a regulated consortium blockchain in real-world situations to ensure the secure sharing of data while removing undesirable content. We propose a decentralized consortium blockchain system prototype that supports redactability and access control. Through the development of a prototype blockchain system, we investigate the feasibility of combining these approaches and demonstrate that it is possible to implement a redactable blockchain with access control in a consortium blockchain setting.

Keywords

Regulation / Chameleon hash / Redactable blockchain / Consortium blockchain

Cite this article

Download citation ▾
Yueyan Dong, Yifang Li, Ye Cheng, Dongxiao Yu. Redactable consortium blockchain with access control: Leveraging chameleon hash and multi-authority attribute-based encryption. High-Confidence Computing, 2024, 4(1): 100168 DOI:10.1016/j.hcc.2023.100168

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of competing interest

The authors declare the following financial interests/personal relationships which may be considered as potential competing interests: This work was supported by the National Key Research and Development Program of China under Grant 2020YFB100 5900.

Acknowledgment

This work was supported by the National Key Research and Development Program of China (2020YFB1005900).

References

[1]

G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain-or-rewriting history in bitcoin and friends, in: 2017 IEEE European Symposium on Security and Privacy, EuroS&P, IEEE, 2017, pp. 111-126.

[2]

H. Krawczyk, Chameleon hashing and signature, in: Proc. Network and Distributed System Security Symposium (NDSS) 2000, Internet Society, 2000.

[3]

J. Ma, S. Xu, J. Ning, X. Huang, R.H. Deng, Redactable blockchain in decentralized setting, IEEE Trans. Inf. Forensics Secur. 17 (2022) 1227-1242.

[4]

M. Chase, Multi-authority attribute based encryption, in:Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007. Proceedings 4, Springer, 2007, pp. 515-534.

[5]

I. Puddu, A. Dmitrienko, S. Capkun, μ Chain: How to forget whouitt hard forks, 2017, Cryptology ePrint Archive.

[6]

M. Florian, S. Henningsen, S. Beaucamp, B. Scheuermann, Erasing data from blockchain nodes, in: 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW, IEEE, 2019, pp. 367-376.

[7]

D. Derler, K. Samelin, D. Slamanig, C. Striecks, Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based, 2019, Cryptology ePrint Archive.

[8]

J. Camenisch, D. Derler, S. Krenn, H.C. Pöhls, K. Samelin, D. Slamanig, Chameleon-hashes with ephemeral trapdoors: And applications to invisible sanitizable signatures, in: Public-Key Cryptography-PKC 2017: 20th IACR International Conference on Practice and Theory in Public-Key Cryptogra-phy, Amsterdam, the Netherlands, March 28-31, 2017, Proceedings, Part II 20, Springer, 2017, pp. 152-182.

[9]

J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: 2007 IEEE Symposium on Security and Privacy, SP’07, IEEE, 2007, pp. 321-334.

[10]

Y. Tian, N. Li, Y. Li, P. Szalachowski, J. Zhou, Policy-based chameleon hash for blockchain rewriting with black-box accountability, in:Annual Computer Security Applications Conference, 2020, pp. 813-828.

[11]

S. Xu, J. Ning, J. Ma, X. Huang, R.H. Deng, K-time modifiable and epoch-based redactable blockchain, IEEE Trans. Inf. Forensics Secur. 16 (2021) 4507-4520.

[12]

Y. Jia, S.-F. Sun, Y. Zhang, Z. Liu, D. Gu, Redactable blockchain supporting supervision and self-management, in:Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, pp. 844-858.

[13]

D. Deuber, B. Magri, S.A.K. Thyagarajan, Redactable blockchain in the permissionless setting, in: 2019 IEEE Symposium on Security and Privacy, SP, IEEE, 2019, pp. 124-138.

[14]

A. Marsalek, T. Zefferer, A correctable public blockchain, in: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE, IEEE, 2019, pp. 554-561.

[15]

T. Ruffing, P. Moreno-Sanchez, A. Kate, Coinshuffle: Practical decentralized coin mixing for bitcoin, in: Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 19, Springer, 2014, pp. 345-364.

[16]

D. Ferraiolo, J. Cugini, D.R. Kuhn, et al., Role-based access control (RBAC): Features and motivations,in:Proceedings of 11th Annual Computer Security Application Conference, 1995, pp. 241-248.

[17]

J.L. Hernández-Ramos, A.J. Jara, L. Marin, A.F. Skarmeta, Distributed capability-based access control for the Internet of Things, J. Internet Serv. Inform. Securit. (JISIS) 3 (3/4) (2013) 1-16.

[18]

V.C. Hu, D.R. Kuhn, D.F. Ferraiolo, J. Voas, Attribute-based access control, Computer 48 (2) (2015) 85-88.

[19]

J.P. Cruz, Y. Kaji, N. Yanai, RBAC-SC: Role-based access control using smart contract, IEEE Access 6 (2018) 12240-12251.

[20]

V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in:Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006, pp. 89-98.

[21]

G. Yu, X. Zha, X. Wang, W. Ni, K. Yu, P. Yu, J.A. Zhang, R.P. Liu, Y.J. Guo, Enabling attribute revocation for fine-grained access control in blockchain-IoT systems, IEEE Trans. Eng. Manage. 67 (4) (2020) 1213-1230.

AI Summary AI Mindmap
PDF (1870KB)

235

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/