Visible to the public CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing

TitleCDEdit: Redactable Blockchain with Cross-audit and Diversity Editing
Publication TypeConference Paper
Year of Publication2022
AuthorsChen, Xiaofeng, Gao, Ying
Conference Name2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Keywordsblockchains, Chameleon hash, compositionality, Costs, cross-audit, data privacy, editing privilege, encryption audits, Metrics, performance evaluation, Protocols, pubcrawl, redactable blockchain, resilience, Resiliency, Resists, System performance
AbstractRedactable blockchain allows modifiers or voting committees with modification privileges to edit the data on the chain. Among them, trapdoor holders in chameleon-based hash redactable blockchains can quickly compute hash collisions for arbitrary data without breaking the link of the hash-chain. However, chameleon-based hash redactable blockchain schemes have difficulty solving issues such as editing operations with different granularity or conflicts and auditing modifiers that abuse editing privileges. To address the above challenges, we propose a redactable blockchain with Cross-audit and Diversity Editing (CDEdit). The proposed scheme distributes subdivided transaction-level and block-level tokens to the matching modifier committee to weaken the influence of central power. A number of modifiers are unpredictably selected based on reputation value proportions and the mapping of the consistent hash ring to enable diversity editing operations, and resist Sybil attacks. Meanwhile, an adaptive cross-auditing protocol is proposed to adjust the roles of modifiers and auditors dynamically. This protocol imposes a reputation penalty on the modifiers of illegal edits and solves the problems of abuse of editing privileges and collusion attacks. In addition, We used ciphertext policy attribute-based encryption (CP-ABE) and chameleon hashes with ephemeral trapdoor (CHET) for data modification, and present a system steps and security analysis of CDEdit. Finally, the extensive comparisons and evaluations show that our scheme costs less time overhead than other schemes and is suitable for complex application scenarios, e.g. IoT data management.
NotesISSN: 2324-9013
DOI10.1109/TrustCom56396.2022.00130
Citation Keychen_cdedit_2022