Redactable blockchain–or–rewriting history in bitcoin and friends

G Ateniese, B Magri, D Venturi… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
We put forward a new framework that makes it possible to re-write or compress the content
of any number of blocks in decentralized services exploiting the blockchain technology. As …

Efficient chameleon hash functions in the enhanced collision resistant model

M Khalili, M Dakhilalian, W Susilo - Information Sciences, 2020 - Elsevier
Chameleon hash functions are collision resistant when only the hashing keys of the
functions are known. In particular, without the knowledge of the secret information, the …

Prbfpt: A practical redactable blockchain framework with a public trapdoor

W Dai, J Liu, Y Zhou, KKR Choo, X **e… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While blockchain is known to support open and transparent data exchange, partly due to its
nontamperability property, it can also be (ab) used to facilitate the spreading of fake and …

Identity-based chameleon hashing and signatures without key exposure

X Chen, F Zhang, W Susilo, H Tian, J Li, K Kim - Information Sciences, 2014 - Elsevier
The notion of chameleon hash function without key exposure plays an important role in
designing secure chameleon signatures. However, all of the existing key-exposure free …

The realm of the pairings

DF Aranha, PSLM Barreto, P Longa… - … Conference on Selected …, 2013 - Springer
Bilinear maps, or pairings, initially proposed in a cryptologic context for cryptanalytic
purposes, proved afterward to be an amazingly flexible and useful tool for the construction of …

Fine-Grained Redactable Blockchain Using Trapdoor-Hash

G Zhou, X Ding, H Han, A Zhu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The blockchain's immutability permits widespread application in untrusted contexts, such as
digital currency, the Internet of Things, and anti-counterfeiting. This functionality, however …

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks

Y Zhang, X Chen, J Li, H Li - Computer Networks, 2014 - Elsevier
As a promising application scenario of wireless technologies, roaming communication
initiates the demand for secure and efficient handoff authentication schemes. However, it …

[HTML][HTML] Sanitizable signature scheme with privacy protection for electronic medical data sharing

Z Xu, M Luo, C Peng, Q Feng - Cyber Security and Applications, 2023 - Elsevier
Electronic medicine has received more and more attention because of its ability to provide
more efficient and better medical services. However, the characteristics of electronic medical …

Communication-efficient verifiable data streaming protocol in the multi-user setting

X **g, M Miao, J Wei, J Wang - IEEE Transactions on Cloud …, 2023 - ieeexplore.ieee.org
Verifiable data streaming (VDS) protocols enable end users with limited storage space to
continuously stream data items to an untrusted cloud server, while preserving the capacity of …

Efficient identity-based chameleon hash for mobile devices

C Li, Q Shen, Z **e, J Dong, Y Fang… - ICASSP 2022-2022 …, 2022 - ieeexplore.ieee.org
Online/offline identity-based signature (OO-IBS) is an adequate cryptographic tool to provide
the message authentication and integrity in mobile devices, since it lightens the …