Computer Science ›› 2024, Vol. 51 ›› Issue (9): 408-415.doi: 10.11896/jsjkx.231000054
• Information Security • Previous Articles Next Articles
WANG Dong, LI Xiaoruo, ZHU Bingnan
CLC Number:
[1]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494. [2]CHEN C.Key Technology in Alliance Chain and Challenges in Monitoring Blockchain[J].Electric Power Equipment Management,2019(11):20-21. [3]PANG J,LIU C,HAO K,et al.Research on Editable Blockchain Model Based on Temporal Index[J].Journal of Frontiers of Computer Science and Technology,2023,17(5):1180-1188. [4]YUAN Y,WANG F Y.Editable blockchain:models,techniques and methods[J].Acta Automatica Sinica,2020,46(5):831-846. [5]PUDDU I,DMITRIENKO A,CAPKUN S.μchain:How to Forget without Hard Forks[J/OL].http://eprint.iacr.org/2017/106.pdf. [6]POLITOU E,CASINO F,ALEPIS E,et al.Blockchain mutability:Challenges and proposed solutions[J].IEEE Transactions on Emerging Topics in Computing,2019,9(4):1972-1986. [7]MARSALEK A,ZEFFERER T.A correctable public blockchain[C]//2019 18th IEEE International Conference On Trust,Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering(TrustCom/BigDataSE).IEEE,2019:554-561. [8]REN Y L,XU D T,ZHANG X P,et al.Deletable blockchainbased on threshold ring signature[J].Journal on Communications,2019,40(4):71-82. [9]REN Y L,XU D T,ZHANGX P,et al.Scheme of revisable blockchain[J].Journal of Software,2020,12:3909-3922. [10]KRAWCZYK H M,RABIN T D.Chameleon hashing and signatures:U.S.Patent 6,108,783[P].[2000-08-22]. [11]ATENIESE G,MAGRI B,VENTURID,et al.Redactable blockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy(EuroS&P).IEEE,2017:111-126. [12]LI P,XU H,MA T,et al.Research on fault-correcting blockchain technology[J].Journal of Cryptologic Research,2018,5(5):501-509. [13]ASHRITHA K,SINDHU M,LAKSHMY K V.Redactableblockchain using enhanced chameleon hash function[C]//2019 5th International Conference on Advanced Computing & Communication Systems(ICACCS).IEEE,2019:323-328. [14]ZHAO X,ZHANG Z,LI Y.An Editable and Accountable Blockchain Scheme[J].Journal of Cyber Security,2022,7(5):19-28. [15]XUE Q,XUE Z,WANG C,et al.One modifiable blockchainscheme based on additive homomorphic encryption algorithm[J].Application Research of Computers,2022,39(11):3232-3237. [16]LV W,WEI S J,YU M H,et al.Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium[J].Chineses Journal of Computers,2021,44(10):2016-2032. [17]WANG R M,WU J Y,ZHANG J H.Blockchain secure datasharing model based on secret sharing [J].JoCQUPT,Natural Science Edition,2023,35(6):1145-1153. [18]XU G,SUN H.Modifiable Blockchain Based on Chebyshev Poly-nomial and Chameleon Hash Function[C]//International Conference on Web Information Systems and Applications.Cham:Springer International Publishing,2022:732-739. [19]SHEN J,CHEN X,LIU Z,et al.Verifiable and RedactableBlockchains With Fully Editing Operations[J].IEEE Transactions on Information Forensics and Security,2023,18:3787-3802. [20]XU Y,XIAO S,WANG H,et al.Redactable blockchain-basedsecure and accountable data management[J].IEEE Transactions on Network and Service Management,2024,21(2):1764-1776. [21]LI F,XU H,SONG Q,et al.BLMA:Editable Blockchain-Based Lightweight Massive IIoT Device Authentication Protocol[J].IEEE Internet of Things Journal,2023,10(24):21633-21646. [22]SHAO W,WANG J,WANG L,et al.Auditable Blockchain Rewriting in Permissioned Setting with Mandatory Revocability for IoT[J].IEEE Internet of Things Journal,2023,10(24):21322-21336. [23]HAAKEGAARD R,LANG J.The elliptic curve diffie-hellman(ecdh)[J/OL].https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/HaakegaardLang.pdf,2015. [24]MERKLER C.Protocols for public key cryptosystems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy.Oakland,CA,USA:IEEE,1980. [25]ZHANG X,TONG W,WANG T,et al.Cipher texts generation method in elliptic curve cryptography based on plaintext length[J].Journal of Computer Applications,2015,35(10):2863-2866,2876. |
[1] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[2] | GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9. |
[3] | HUANG Shoumeng, YANG Boxiong, YANG Ming. Privacy Data Editing Mechanism Based on Distributed Chameleon Hash Function [J]. Computer Science, 2024, 51(6A): 240100157-5. |
[4] | YAN Jiahe, LI Honghui, MA Ying, LIU Zhen, ZHANG Dalin, JIANG Zhouxian, DUAN Yuhang. Multi-source Heterogeneous Data Fusion Technologies and Government Big Data GovernanceSystem [J]. Computer Science, 2024, 51(2): 1-14. |
[5] | XIE Zhuo, ZHANG Zhi-hong, LI Lei, FENG Ying-jie, CHEN Jing. Improvement of PBFT Algorithm Based on Consortium Blockchain [J]. Computer Science, 2022, 49(11): 360-367. |
[6] | WANG Ri-hong, ZHOU Hang, XU Quan-qing, ZHANG Li-feng. Non-byzantine Fault Tolerance Consensus Algorithm for Consortium Blockchain [J]. Computer Science, 2021, 48(9): 317-323. |
[7] | WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42. |
[8] | ZONG Si-jie, QIN Tian, HE Long-bing. Analysis and Application of Secure Boot Algorithm Based on IOT Chip [J]. Computer Science, 2021, 48(11A): 552-556. |
[9] | MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11. |
[10] | YOU Wen-zhu, GE Hai-bo. High-performance FPGA Implementation of Elliptic Curve ECC on Binary Domain [J]. Computer Science, 2020, 47(8): 127-131. |
[11] | YUE Wen-jiao, LI Peng, WEN Jun-hao, XING Bin. Study on Impact Assessment Model of Enterprise Data Application [J]. Computer Science, 2020, 47(11A): 520-523. |
[12] | YIN Qiu-shi, CHEN Jian-hua. Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment [J]. Computer Science, 2018, 45(6): 111-116. |
[13] | . Chameleon Signature Scheme Based on Lattice [J]. Computer Science, 2013, 40(2): 117-119. |
[14] | . Improved Remote Attestation Mechanism of Platform Configuration Based on Chameleon Hashes [J]. Computer Science, 2013, 40(1): 118-121. |
[15] | . Research on General Wireless Authentication Protocol Based on PKI [J]. Computer Science, 2012, 39(7): 74-77. |
|