Next Article in Journal
Aviation Cybersecurity Governance: Towards an Operational Framework and Solutions Agenda for the Airport Domain
Previous Article in Journal
Unveiling the Factors for MOOC Adoption: An Educational Data Mining Perspective
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Verifiable and Redactable Blockchain with Lightweight Storage and Permission Supervision

1
School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
2
Guangdong Key Laboratory of Blockchain Security, Guangzhou University, Guangzhou 510006, China
3
State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
4
State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi’an 710126, China
5
Institute of Cybersecurity and Cryptology, University of Wollongong, Wollongong, NSW 2522, Australia
*
Author to whom correspondence should be addressed.
Information 2026, 17(2), 176; https://doi.org/10.3390/info17020176
Submission received: 16 January 2026 / Revised: 3 February 2026 / Accepted: 5 February 2026 / Published: 9 February 2026
(This article belongs to the Section Information Security and Privacy)

Abstract

As a promising decentralized paradigm, the verifiable and redactable blockchain offers a feasible solution for achieving authorized and controlled redaction of on-chain data. However, existing schemes suffer from rapidly expanding ledgers caused by authentication data structures and fail to strike a balance between permission supervision and redaction efficiency. In this paper, we propose a novel verifiable and redactable blockchain scheme that introduces a dual-level authentication architecture to achieve lightweight storage and permission supervision. To this end, we first design a dual-level authentication data structure that appends all blocks to a constant-size global tag, while supporting verifiable redaction and query over on-chain data. Likewise, we introduce a dual-level chameleon hash structure, which not only employs committee members holding sub-keys to redact on-chain data but also enables the certificate authority to use the master key to correct malicious redactions executed by corrupted committee members. Furthermore, we propose an efficient auditing protocol to enhance the integrity and consistency of the blockchain ledger during the process of synchronous circulation. Finally, both security analysis and performance evaluation prove that the proposed scheme is practical.

Graphical Abstract

1. Introduction

Benefiting from various advantageous features, such as decentralization and immutability, the blockchain [1,2,3] provides a feasible solution for various trust issues in complex data service scenarios, such as digital currency, supply chain [4,5] management, insurance [6], public key infrastructure (PKI) systems [7,8], and energy systems. Among these characteristics, the immutability derived from the underlying cryptographic tools and data structure enables that the data cannot be modified once it has been recorded on the blockchain, thus ensuring the security and ledger consistency of the blockchain.
However, immutability is a double-edged sword, that is, it also brings a series of challenges and limitations for blockchain. First of all, malicious users may upload illegal or improper information to the blockchain [9,10], thereby polluting the blockchain environment. In addition, malicious attackers may exploit unmodifiable on-chain security vulnerabilities to launch attacks for reaping illicit profits, which will lead to massive financial losses for victims. Finally, increasingly sophisticated laws and regulations [11] have imposed higher security requirements for data circulation, such as “The right to be forgotten”, while the immutability conflicts with these requirements and cannot support legal implementation, thereby restricting the development of blockchain.
To this end, Ateniese et al. [12] proposed the concept of redactable blockchain, which adopts a chameleon hash function [13] to reconstruct the hash-chain structure of blockchain, thus enabling the regulator holding the trapdoor key to redact the on-chain data without changing the block hash value. Furthermore, they also provide a variant for public blockchain (i.e., permissionless setting) by employing the top 7 mining pools as participants and utilizing multi-party computation and secret sharing to achieve on-chain data modification without a central authority. Inspired by this, there is a series of related works was proposed, including access control [14,15,16,17,18], traceability [19,20,21,22,23], and self-management [24]. However, all of them cannot support the revocation of old data items, which incurs the issue of coexistence of multiple versions, meaning that a malicious full node may synchronize different ledger versions to other users, and  thus severely compromise the consistency of the blockchain ledger.
Fortunately, Tian et al. [25] proposed a verifiable redactable blockchain (VRBC) architecture, which introduces an authentication data structure to achieve verifiable redaction and query. Likewise, Shen et al. [26] proposed a verifiable and redactable blockchain with full redaction capabilities, achieving complete editability of block objects and verifiability of the blockchain state. Despite this, these schemes lead to a rapidly expanding ledger caused by the underlying authentication data structure. In this setting, the additional storage overhead will increase linearly with the size of the blockchain (i.e., block number). Moreover, the unbounded growth of the chain increases verification costs, severely degrading system performance, particularly under high transaction volumes.

1.1. Related Work

As shown in Table 1, Ateniese et al. [12] proposed the first redactable blockchain, which relies on one or more fixed authorities to execute the modification of on-chain data. For efficient permission distribution, Derler et al. [14] proposed a fine-grained and controlled-rewriting redactable blockchain, which adopts policy-based chameleon hashes (PCHs), to realize fine-grained control. To address the vulnerabilities of a single-authority model, Ma et al. [15] introduced the decentralized policy-based chameleon hash (DPCH). In their scheme, redaction permissions are distributed among multiple authorities, thus achieving fine-grained control in a decentralized setting. Afterward, Qin et al. [16] proposed the traceable decentralized policy-based chameleon hash to enhance security, enabling redactable blockchains with features of both decentralized privilege management and modifier accountability. For improving the efficiency of PCH, Yusoff et al. [18] proposed an efficient policy-based chameleon hash framework, which not only improves overall performance but also provides security against chosen-ciphertext attacks.
There is no doubt that permission management must be carried out simultaneously with permission distribution; otherwise, the problem of permission abuse will arise. Currently, there are mainly three research directions attempting to manage modification permissions in editable blockchains: limiting the number of modifications, designing supervision models, and establishing traceback accountability. Regarding the number of modifications, Xu et al. [20] proposed a redactable blockchain called KERB, which supports a limited number of modifications and adopts a cycle-based redaction framework with a monetary penalty mechanism. Similarly, Li et al. [21] proposed a redactable blockchain scheme (CCE-RB), which achieves regulation by limiting the number of times a user can perform redacts and enabling the revocation of their redaction permissions. In addition, Duan et al. [22] introduced novel t-time chameleon hash (t-CH) and signature (t-CS) schemes, where the trapdoor is exposed after exceeding t collisions, and used them to construct a controlled redactable blockchain protocol that supports a limited number of edits with a transparent setup. With regard to permission supervision, Jia et al. [24] introduced the Stateful Chameleon Hash with Revocable Subkey (sCHRS) as the core of a redactable blockchain scheme, which supports self-supervision and self-governance to prevent redactors from abusing their permissions. However, their approach of allowing users to freely modify their own data is impractical. This is because a malicious user could launch a denial-of-service (DoS) attack against the supervisory authority. Such behavior would not only create a heavy workload for the regulator but also severely compromise the consistency of the blockchain ledger. Focusing on traceback accountability, Panwar et al. [19] utilized a dynamic group signature scheme to construct an editable blockchain that is both revocable and traceable.
Nevertheless, while the aforementioned schemes effectively address the challenges of permission distribution and supervision, they generally overlook the management of historical data items following a redaction. Specifically, these approaches lack a mechanism to explicitly revoke outdated data items, inevitably leading to the coexistence of multiple versions on the chain, thereby compromising the consistency of the blockchain ledger.
To address this issue, Tian et al. [25] put forward a verifiable and redactable blockchain scheme supporting efficient querying and integrity auditing, which mitigates the resource waste and security risks caused by ledger inconsistencies. Shen et al. [26] proposed a verifiable redactable blockchain that supports full edit operations, including block appending, insertion, modification, and deletion. The scheme employs incentives to ensure the timely revision of block edits and invalidates historical versions by verifying the blockchain state. Xu et al. [29] introduced an efficient Merkle tree-based dynamic update verification mechanism, which enables rapid version checking and enforced update modifications. In 2025, Yang et al. [31] proposed a secure and efficient decentralized chameleon hash scheme based on Schnorr threshold signatures (CHSTs) to allow for collaborative data redaction by edge nodes. Furthermore, to  ensure ledger consistency, they designed a separate modification verification mechanism based on vector commitments. Wang et al. [32] proposed a resilient and redactable blockchain (RRB) that supports both transaction-level and block-level data modifications on-chain. By  employing an accumulator-based version detection mechanism, the RRB enables effective revocation of outdated data versions.
Although the aforementioned schemes effectively resolve the verifiability issue in redactable blockchains, they typically rely on heavy authentication data structures. In a distributed ledger setting, this dependence inevitably results in additional storage consumption. Such ledger expansion is particularly unfriendly to lightweight nodes, imposing high computational costs and storage burdens on clients. Therefore, it is considered of great significance to investigate a lightweight verifiable redactable blockchain.

1.2. Our Contribution

In this paper, we propose a verifiable and redactable blockchain with lightweight storage and permission supervision, including the following three contributions:
  • We propose a novel blockchain architecture with a dual-level chameleon hashing structure for effective supervision, which enables the regulator holding the trapdoor key of inner hashing to redact the on-chain data, while allowing the certificate authority holding the outer hash trapdoor key to correct the malicious redaction executed by compromised regulators.
  • We propose a dual-level authentication data structure for our dual-level redactable blockchain, in which all blocks are appended to a constant-size global tag, thus achieving lightweight storage while enabling verifiable data queries and updates over on-chain data.
  • We propose an on-chain data auditing protocol, which allows blockchain nodes to verify the integrity and validity of the blockchain ledger before synchronizing it, thereby enhancing the security and ledger consistency of the blockchain system.

2. Preliminaries

2.1. Strong RSA Assumption

Definition 1
(Strong RSA Assumption). Given a security parameter λ, there is a product N of two distinct odd primes p and q, of λ/2-bit. And given a randomly sampled member y Z N * , it is considered computationally infeasible to find a pair ( x , e ) such that the equation x e y ( mod N ) holds. The constraint for this problem is that e > 1 can be any positive integer.
Lemma 1
(Shamir’s Trick [33]). Given x , y Z N together with a , b Z such that x a = y b ( mod N ) and gcd ( a , b ) = 1 , there is an efficient algorithm for computing z Z N such that z a = y ( mod N ) . Let α , β Z be integers such that α a + β b = 1 . Then, z = y α x β is the desired number as z a = y α a x β a = y α a y β b = y α a + β b = y ( mod N ) .

2.2. Chameleon Hash Functions

For better security, Chen et al proposed a double-trapdoor chameleon hash function with efficient trapdoor collision and key exposure resistance. The concrete construction CH   =   ( Setup ,   KeyGen ,   CH ,   Col ,   Verify ) [34] including five PPT algorithms, as follows.
  • Setup ( 1 λ ) ( p p ) : On input security parameters 1 λ , this algorithm outputs public parameters p p .
  • KeyGen ( p p ) ( T K , H K ) : On input public parameters p p , this algorithm outputs hash key ( T K , H K ).
  • CH ( m , H K ) ( h , r , Y ) : On input m and public hash key H K , this algorithm outputs a hash value h and verification string ( r , Y ).
  • Col ( T K , m , m , r ) ( Y , r ) : On input a new data m and an old m, a secret trapdoor key T K , outputs a collision ( m , Y , r ) for ( m , Y , r ) .
  • Verify ( m , h , H K , Y , r ) 0 / 1 : On input a data m, h, public hash key H K , and  ( r , Y ) , this procedure outputs 1 if h is valid. Otherwise, it outputs 0.

2.3. Retrievable Homomorphic Verifiable Tags

To achieve optimal storage, Tian et al. [35] proposed the Retrievable Homomorphic Verifiable Tags. The concrete construction RHVT = ( Setup ,   KeyGen ,   TagGen ,   TagVerify ,   Tag Agg ,   Ta gAux ,   TagRet ,   AggTagUpdate ) is an algorithm tuple containing eight polynomial-time algorithms, as follows:
  • Setup ( 1 λ ) ( p p ) : Input the security parameter 1 λ , then output a set of public parameters p p .
  • KeyGen ( 1 λ ) ( v k , s k ) : On input a security parameter ( 1 λ ) , the key generation algorithm outputs a public verification key v k and a secret key s k .
  • TagGen ( s k , m ) σ : The tag generation algorithm takes as input sk and data item m, outputs an RHVT tag σ .
  • TagVerify ( v k , σ , m ) 0 / 1 : The tag verification algorithm takes as input σ , m and v k , outputs 1 if σ is valid on m, and 0 otherwise.
  • TagAgg ( v k , σ , m , σ * ) σ * . On input ( σ , m ) and an aggregated tag σ *   with initial   state 1 , if  σ is valid, the aggregation algorithm outputs a new aggregated tag σ * .
  • TagAux ( v k , { m i } i ϵ [ ] , s ϵ [ ] ) aux s : The local auxiliary algorithm takes as input { m i } i ϵ [ ] and s ϵ [ ] , outputs auxiliary information aux s for m s , which will be used to retrieve its original tag σ s from σ * .
  • TagRet ( v k , σ * , aux s , s ϵ [ ] ) σ s : The tag retrieval algorithm takes as input σ * , aux s , s ϵ [ ] and the tag retrieval algorithm outputs the original RHVT tag of the s-th data item m s .
  • AggTagUpdate ( v k , σ i , σ * , σ i ) σ * : On input v k , σ * , the tag σ i , and a new tag σ i , the aggregated tag update algorithm outputs a new aggregated tag σ * .

3. Problem Statement

This section presents the system architecture and the definitions of our proposed scheme.

3.1. System Architecture

There are five entities in our model:
  • Certificate Authority (CA): A fully trusted entity in charge of system initialization and binding each block to a fixed-size tag. Meanwhile, it can deprive the redaction permission of a malicious regulator.
  • Blockchain Miner (BM): The full nodes that can append new blocks to the blockchain ledger only when they win in the current consensus process, and all of them will maintain the entire ledger.
  • Verifier/Auditor (VA): A light node (LN) that can query and verify on-chain data, or check the integrity of the blockchain ledger, and make requests for changes when necessary.
  • Prover/Auditee (PA): A full node holds the entire blockchain ledger and is responsible for providing verifiable data query or ledger synchronization services.
  • Redactor (R): A dynamic committee of elected members who serve in rotation as the regulator for each cycle, redacting on-chain data according to user requests. Their actions are supervised by the CA, which is responsible for correcting errors and revoking permissions in response to malicious behavior.

3.2. Definitions

Inspired by [24,35], we give the definition of our scheme based on a tag construction RHVT = ( Setup , KeyGen , TagGen , TagVer ify , TagAgg , TagAux , TagRet , AggTagUpdate ) and the chameleon hash CH = ( Setup , KeyGen , CH , Col , Verify ) .
  • As shown in Figure 1, a redactable blockchain consists of a sequence of blocks B i = ( h i 1 , r 2 , i , r 1 , i , Y 1 , i , Y 2 , i , s p k I , m i , h 2 , i , h 1 , i , c t r i , h i ) , in which h 2 , i , h 1 , i , Y 1 , i , Y 2 , i , s p k I G , r 2 , i , r 1 , i , h i 1 Z P * , m i { 0 , 1 } λ and c t r i N . For each new block B i , the miner adopts the Merkle root m i computed over the transactions { T 1 , , T X } to generate inner hash value h 2 , i and outer hash value h 1 , i for the new block B i . Finally, generate the block hash value h i .
    h 2 , i = CH ( r 2 , i , Y 2 , i , m i ) h 1 , i = CH ( r 1 , i , Y 1 , i , h 2 , i , s p k I , h i 1 ) h i = H ( h 1 , i , c t r i )
    where h i 1 is the hash of the previous block and r 1 , i , r 2 , i , Y 1 , i , Y 2 , i is the validation string in CH , and  c t r i is the Nonce value of the block B i , s p k I is the public key of cycle I, h i is the hash of the block B i .
Based on the dual-level hash blockchain architecture, we further introduce the formalized definition for the proposed scheme, including ( Setup , KeyGen , Bind , Redact , Query , Audit ).
(1).
Setup ( 1 λ ) ( p p ): Given security parameter 1 λ , this algorithm outputs public parameters p p .
(2).
KeyGen ( 1 λ )  →  ( p k , s k , m p k , m s k , s p k 1 , s s k 1 ) : On input 1 λ , this algorithm outputs the following keys:
  • A secret key s k and a public key p k , which can be used to calculate tags by CA.
  • An outer public key m p k and an outer secret key m s k , which are used by CA to calculate the outer hash value.
  • A set of inner public key s p k 1 and a set of inner secret key s s k 1 , which are used by the 1-th R 1 to compute the inner hash value.
(3).
Bind ( p k , s k , m p k , s p k I , m i , h i 1 )  →  ( h 1 , i , r 2 , i , r 1 , i , s p k I , h 2 , i , Y 2 , i , Y 1 , i , σ i , σ I * , δ I , δ * ) : On input p k , s k , m p k , s p k I , m i and h i 1 , the bind algorithm outputs a CH value h 1 , i and a new tag cycle ( σ i , σ I * , δ I , δ * ) :
  • CH ( m i , s p k I )  →  ( h 2 , i , r 2 , i , Y 2 , i ) : R I returns a inner hash value h 2 , i and its check string ( Y 2 , i , r 2 , i ) .
  • CH ( h i 1 , s p k I , h 2 , i , m p k )  →  ( h 1 , i , r 1 , i , Y 1 , i ) : R I returns a outer hash value h 1 , i and its check string ( Y 1 , i , r 1 , i ) .
  • Tagbind ( p k , s k , m i , σ I * , δ * )  →  ( σ i , σ I * , δ I , δ * ) . CA runs TagGen algorithms to generate RHVT inner layer tag σ i and outer layer tag δ I , and runs TagAgg algorithms to generate RHVT inner layer aggregated tag σ I * and outer layer aggregated tag δ * . We adopted a dual-level authentication data structure. Cycling all blocks, set each k blocks as a cycle. I = i / k .
(4).
Redact : The interaction protocol can update the validation character and update the inner and outer tags.
  • Col ( m s k / s s k I , m i , m i , s p k I , m p k ) ( r ) : The CA with m s k or the R I with s s k I runs Col algorithm to generate the updated verification string r . If it is the R I looking for the collision, r = ( Y 2 , i , r 2 , i ) . If it is the CA looking for the collision, r = ( Y 1 , i , r 1 , i , r 2 , i , h 2 , i ) .
  • TagUpdate ( p k , s k , m i , m i , σ i , σ I * , δ I * , δ * )  →  ( σ i , σ I * , δ I * , δ * ) : CA runs TagGen algorithms to generate a new RHVT inner layer tag σ i for new m i , and runs AggTagUpdate algorithms to generate a new inner layer aggregated tag σ I * . For the outer layer, CA runs TagGen algorithms to generate a new RHVT outer layer tag δ I * for new σ I * , and runs AggTagUpdate algorithms to generate a new outer layer aggregated global tag δ * .
(5).
Query : Through this protocol, the correctness and validity of on-chain data can be verified, as follows:
  • Chal ( p p ) s : On input p p , this algorithm outputs the index s of the queried block.
  • Prove ( s ) ( m s , a u x s ) : On input s, CA runs TagAux algorithm to generate the auxiliary information a u x s , and then outputs ( m s , a u x s ) .
  • Verify ( δ * , σ I * , m s , a u x s ) 0 / 1 : VA retrieves inner layer tag σ s and outer layer tag δ I from aggregated σ I * , δ * by running TagRet algorithm, and then outputs the verification result TagVerify ( σ s , m s ) 0 / 1 .
(6).
Audit : To verify the integrity of the blockchain ledger, CA and PA perform the following interactive protocol:
  • Chal ( p p ) C h a l : On input p p , this algorithm outputs a challenge C h a l .
  • Prove ( C h a l ) ( π , { a u x s } s S ) : Upon receiving the challenge C h a l , CA first identifies the index set S of the challenged data items and then proceeds to generate an integrity proof π with the corresponding auxiliary information { a u x s } s S .
  • Verify ( δ * , σ I * , π , { a u x s } s S ) 0 / 1 : Upon receiving the input tuple ( δ * , σ I * , π , { a u x s } s S ) , the VA runs TagRet algorithm for each s S to retrieve the inner tag σ s , and then outputs the verification result of π .

3.3. Threat Model

In this section, we define the threat model for our proposed scheme, consisting of three security goals, as follows.
  • Correctness : If the system parameters, the data structure, and the proof are honestly generated by the corresponding algorithms ( Setup , KeyGen , Bind , Redact , and  Proof respectively), then during the block query or blockchain auditing phase, the  Verify procedure outputs 1 for any valid challenge C h a l .
  • Soundness : If a prover successfully convinces a VA that the challenged block data is intact and valid in a query or auditing process. It must be true that the prover actually stores that data. Specifically, we define a soundness experiment between a challenger C and a PPT adversary A , which consists of the following phases:
    I n i t i a l i z a t i o n : The challenger C first generates public parameter p p , and sends ( p p , v k ) to the adversary A ;
    Q u e r y : A can adaptively make a polynomial number of TagGen queries to the challenger C. For each query on a data item m t , C correctly generates its corresponding inner layer tag σ t , and faithfully updates the entire hierarchy of aggregate tags, including the inner layer aggregate σ I * , the outer layer tag δ I , and the global aggregate δ * . C then returns the resulting individual tag σ t and its index t to A .
    C h a l l e n g e : C constructs a query/audit challenge C h a l and submits it to A , requiring A to return a corresponding proof for the data items designated by C h a l .
    V e r i f y : C validates the proof π against the challenge tuple ( C h a l , C ) . The procedure outputs 1 for a successful validation and 0 otherwise.
  • Controlled redaction : A cannot derive the trapdoor key r s = ( r 2 , s , r 1 , s , h 2 , s , Y 2 , i , Y 1 , i ) from a given collision ( m s , r s ) for ( m s , r s ) . In addition, only the user holding the trapdoor key is able to generate new collisions ( m s , r s ) for ( m s , r s ) .

4. The Proposed Scheme

In this section, we describe the concrete construction of the proposed scheme, as shown in Figure 2.

4.1. Overview

Existing schemes face two primary limitations. First, their reliance on authenticated data structures often leads to rapid ledger growth and significant storage overhead. Second, they typically struggle to strike an effective balance between robust permission supervision and redaction efficiency. To address these challenges, we propose a novel scheme based on a dual-level verifiable and redactable blockchain architecture, which is guided by two key objectives: achieving lightweight storage overhead and enabling effective permission supervision.
First, to reduce the storage overhead typically introduced by authenticated data structures, we introduce a dual-level authenticated data structure. Its core principle is that the blockchain data is grouped, and the tags within each group are aggregated together to form inner layer aggregation tags σ I * . Next, these inner layer aggregation tags are further used to generate their respective outer layer tags δ I , which are then aggregated together to form an outer layer global tag δ * . This hierarchical design is the key to achieving lightweight storage, as the final global tag δ * maintains a constant size regardless of the number of blocks on the blockchain.
Secondly, for effective permission supervision, we utilize a dual-level chameleon hash structure. This establishes a hierarchical permission model, whose inner layer is managed by a redactor formed through an election in the system setup phase. In this architecture, we introduce a dynamic regulator committee that operates on a rotational basis, where the designated regulator’s hash public key is used to generate the inner layer hashes for all blocks within a given cycle. For convenience, we assume that a cycle consists of the generation of k new blocks. In the outer layer, a CA provides oversight, holding a master key to intervene and correct any malicious edits. This also empowers the CA to manage the committee, for instance, by removing malicious regulators and admitting new members. This two-tier approach is the key to striking a clear balance between redaction efficiency and robust governance, thus providing effective permission control.

4.2. The Concrete Construction

4.2.1. System Setup

Given one security parameter ( 1 λ , 1 λ 1 , 1 λ 2 ), CA runs Setup algorithm to initialize system. First, CA establishes an RSA modulus N = p q by selecting two λ / 2 bits primes p and q. Then he selects a generator g for the subgroup Q R N of Z N * , and generates a group G of prime order p 1 , with its generator being g 1 . Next, CA picks a ( λ + λ 1 + λ 2 + 2 ) -bits prime e and computes a secret key d where e d = 1 ( mod φ ( N ) ) , and sets the parameter g d = g d ( mod N ) .
CA initializes two pseudo-random permutations/functions and defines three hash functions and a prime hash function [36]:
ϕ 1 : { 0 , 1 } λ 1 × { 0 , 1 } λ 2 { 0 , 1 } λ 1 ϕ 2 : { 0 , 1 } λ 1 × { 0 , 1 } λ 2 { 0 , 1 } λ 2 H : { 0 , 1 } * { 0 , 1 } λ 2 H Prime : { 0 , 1 } * Prime ( λ )
After that, it picks two elements name 1 ,   name 2 Z N * at random and then initializes two counters cnt 1 1 , cnt 2 1 , and two aggregated tags σ * 1 , δ * 1 .
Furthermore, CA runs KeyGen algorithm to generate trapdoor keys x, y, x 1 , y 1 Z p 1 * , hash key H K   = ( X , Y )  =  ( g 1 x , g 1 y ) , H K 1 = ( X 1 , Y 1 ) = ( g 1 x 1 , g 1 y 1 ) . Finally, it outputs p k   = ( N , e, g, g 1 , g d , H K , name 1 , name 2 , H , H Prime , ϕ 1 , ϕ 2 ) , s k = ( p ,   q ,   d ,   cnt 1 ,   cnt 2 ,   u 1 * ,   u 2 * ) , m p k = ( H K ) , m s k = ( x , y ) , s p k 1   = ( H K 1 ) , m s k 1 = ( x 1 , y 1 ) . The CA utilizes the key pair ( p k , s k ) to perform tag operations. It uses the outer key pair ( m p k , m s k ) to perform outer hash function operations and manage the inner R I . Additionally, it corresponds to the first inner key pair ( s p k 1 , s s k 1 ) to R 1 .
We assume that R 1 is the regulator of the I-th cycle, and it has the inner key pair ( s p k I , s s k I ) , I = i / k . For simplicity, in the following, we use k = 10 as an example.
CA calculates the genesis block hash h 0 = H ( p p | | c t r 0 ) , and generates the genesis block B 0 . Finally, CA broadcasts B 0 = ( h 0 , c t r 0 , p p ) on the blockchain network.

4.2.2. Block Append

When BM wins the consensus, he first generates a new block B i , and then runs Bind algorithm to append it to the blockchain.
  • Hash binding: BM randomly selects two random values r 2 , i Z P 1 * , r 1 , i Z P 1 * and computes the inner layer hash value h 2 , i and outer layer hash value h 1 , i of B i .
    h 2 , i = ( X I · Y I ) H ( m i , Y I ) · g 1 r 2 , i h 1 , i = ( X · Y ) H ( h 2 , i | | X I | | h i 1 , Y ) · g 1 r 1 , i
    where h i 1 = H ( h 1 , i 1 , c t r i 1 ) . Then, the block B i = ( h i 1 , h 1 , i , m i , r 2 , i , r 1 , i , Y 1 , i = Y , Y 2 , i = Y I , h 2 , i , s p k I ) is added to the blockchain.
  • Tag binding: The data m is first indexed as m i ( i cnt 2 ), and CA generates a tag σ i for each block, as follows.  
    ρ i = H ( name 2   i ) u i = H Prime ( name 2   i ) σ i = g ρ i + m i u i d ( mod N )
    Second, the tag σ i is aggregated by the CA into the inner layer tag σ I * , and  I = i / 10 .
    σ I * σ I * · σ i = t = 1 cnt 2 g ρ i + m i u i d ( mod N )
    After that, CA updates cnt 2 cnt 2 + 1 . When the number of data added to inner aggregation tag σ I * in cycle I reaches 10 (This group-binding mechanism is analogous to a confirmation process in a blockchain, providing enhanced fault tolerance and enabling the correction of erroneous blocks within the finalized group), the CA uses the inner aggregation tag to the outer tag, as follows.
    ρ ^ I = H ( name 1   I ) u ^ I = H Prime ( name 1   I ) δ I = g ρ ^ I + σ I * u ^ I d ( mod N )
    Then, CA aggregates δ I to the global tag δ * and updates the relevant data, as follows.
    δ * δ * · δ I = I = 1 cnt 1 g ρ ^ I + δ I * u ^ I d ( mod N )
    cnt 1 cnt 1 + 1
    Finally, CA publishes the new block B i , the inner tag σ i , inner aggregation tag σ I * , outer layer tag δ I , and the global tag δ * on the blockchain.
  • Upon receiving the new blocks B i and their associated tags σ i , δ I , all LNs will verify the inner and outer layer hash values and the tags, as follows.
    σ i e u i = ? g ρ i + m i ( mod N ) δ I e u ^ I = ? g ρ ^ I + σ I * ( mod N ) h 2 , i = ? ( X I · Y I ) H ( m i , Y I ) · g 1 r 2 , i h 1 , i = ? ( X · Y ) H ( h 2 , i | | X I | | h i 1 , Y ) · g 1 r 1 , i
    If Equation (6) holds, the LNs discards both σ i and δ I for alleviate the storage cost and then adds B i to the local blockchain ledger.

4.2.3. Block Redaction

To redact the s-th block(e.g., replacing m s with m s ), one of the following processes will be executed by the regulator or CA.
  • Regular Redaction: For a regular redaction requirement, R I computes the k s of the inner hash value h 2 , s to generate a valid hash collision.
    k s = H ( m s , Y I ) · ( x I + y 2 , s ) + r 2 , s mod p 1
    Then, R I generates a one-time key y 2 , s = H 2 ( x I , m s ) and its hash key Y 2 , s = g 1 y 2 , s . And  R I calculates the new inner layer verification value r 2 , s .  
    r 2 , s = k s H ( m s , Y 2 , s ) · ( x I + y 2 , s ) mod p 1
    The collision block B s = ( h s 1 , h 1 , s , m s , r 2 , s , r 1 , s , Y 1 , s , Y 2 , s , h 2 , s , s p k I ) for B s = ( h s 1 , h 1 , s , m s , r 2 , s , r 1 , s , Y 1 , s , Y 2 , s , h 2 , s , s p k I ) .
    When m s is replaced by m s , CA updates the tag information for the new block information. First, CA generates an inner layer tag σ s for m s , updates inner layer aggregated tag σ I * , and generates outer layer tag δ I for σ I * , updates aggregated global tag δ * (When m s belongs to the last group, and the last group is less than 10, only the inner tag needs to be updated).
    σ s = g ρ s + m s u s d ( mod N ) σ I * = σ I * σ s · σ s ( mod N ) δ I = g ρ ^ I + σ I * u ^ I d ( mod N ) δ * = δ * δ I · δ I ( mod N )
    Finally, CA publishes the new block B s and the updated tag ( σ I * , δ * ) on the blockchain.
  • Correction: For a malicious redaction executed by a compromised regulator, CA selects a random number r 2 , s Z p 1 * , and uses the master key to replace the subordinate key pair of the original R I to recalculate the inner layer hash h 2 , s .
    h 2 , s = ( X · Y ) H ( m s , Y ) · g 1 r 2 , s
    And, CA computes the K s of the outer layer hash h 1 , s .
    K s = H 1 ( h 2 , s | | X I | | h s 1 , Y ) · ( x + y 1 , s ) + r 1 , s mod p 1
    Then, CA calculates y 1 , s = H ( x , h 2 , s | | X | | h s 1 ) , Y 1 , s = g y 1 , s , and the new outer layer verification value r 1 , s .
    r 1 , s = K s H ( h 2 , s | | X | | h s 1 , Y 1 , s ) · ( x + y 1 , s ) mod p 1
    At this point, for the s-th block, the redaction authority of user R I (I = s / 10 ) has been transferred to CA. The collision block B s = ( h s 1 , h 1 , s , m s , Y 2 , s = Y , Y 1 , s , r 2 , s , r 1 , s , h 2 , s , s p k I ) for B s = ( h s 1 , h 1 , s , m s , Y 2 , s , Y 1 , s , r 2 , s , r 1 , s , h 2 , s , s p k I ) . And CA updates the tag information according to Equation (9).
  • Update.block: A validity check based on Equation (6) is first performed by the LNs. If the check succeeds, they update the local blockchain ledger.

4.2.4. Block Query

The VA initiates a query for the data m s of the s-th block by executing the Query protocol, as follows. We define the set W = ( 10 ( I 1 ) + 1 , 10 I ) .
First, The PA generates the inner and outer layer auxiliary information for the data m s (where I = s / 10 ), as follows:  
f ^ I = i I ( ρ ^ i + σ ^ i ) k { i , I } u ^ k F ^ I = g d f ^ I ( mod N ) f s = i s , i W ( ρ i + m i ) k { i , s } u k F s = g d f s ( mod N )
Then, VA gets the tuple π q = ( m s , F s , σ I * , F ^ I ) , and calculates u I * 1 , i W i u i , u ^ * 1 , I u ^ I . It runs TagRet algorithm to retrieve the outer layer tag δ I from the global tag  δ * .
u ^ I = H Prime ( name 1   I ) u ¯ ^ I = u ^ * / u ^ I ( mod φ ( N ) ) x = δ * u ¯ ^ I / F ^ I ( mod N ) y = g ( ρ ^ I + σ I * ) d ( mod N ) δ I = Shamir ( x , y , a = u ^ I , b = u ¯ ^ I )
If gcd ( a , b ) = 1 and x a y b ( mod N ) the function Shamir ( x , y , a , b ) outputs a value z = y α x β Z N where α a + β b = 1 , such that.
z a = y α a x β a = y α a y β b = y α a + β b = y ( mod N )
The value z is the δ I , and the VA verifies that the tag is valid.
δ I e u ^ I = ? g ρ ^ I + σ I * ( mod N )
If the verification is valid, VA retrieves the σ s from the σ I * . Otherwise, it discards the tuple. The VA runs (17) to calculate the original label σ s and validate the tag.
u s = H Prime ( name 2   s ) u ¯ s = u I * / u s ( mod φ ( N ) ) x = σ I * u ¯ s / F s ( mod N ) y = g ( ρ s + m s ) d ( mod N ) σ s = Shamir ( x , y , a = u s , b = u ¯ s )
σ s e u s = ? g ρ s + m s ( mod N )
If the equation is invalid, the VA discards the block data m s . Otherwise, he proceeds to verify the correctness of the queried block’s hash value.
h 2 , s = ? ( X I · Y I ) H ( m s , Y I ) · g 1 r 2 , s h 1 , s = ? ( X · Y ) H ( h 2 , s | | X I | | h s 1 , Y ) · g 1 r 1 , s
If both Equations (19) are valid, the VA remains B s locally. Otherwise, he discards it.

4.2.5. Blockchain Auditing

The VA checks the integrity of the blockchain ledger by executing the Audit protocol, as follows.
  • Chal : VA selects three random elements z [ cnt 2 ] and r 1 , r 2 { 0 , 1 } λ 2 . Subsequently, VA publishes the C h a l = ( z , r 1 , r 2 ) to the blockchain.
  • Proof : In response to the C h a l , PA generates Algorithm 1 and publishes the integrity proof π for each group on the blockchain, while also transmitting the corresponding verification metadata π I = ( σ I * , F ^ I , { F s , y s } s ( z ) ) to VA via a secure off-chain channel.
  • Verify : Run Algorithm 2 for the proof of each group, if  flag = 0 , VA aborts this process. Otherwise, it verifies the challenged blocks’ correctness via Equation (19). If the verification is successful, VA issues a final audit result on the blockchain, indicating that the ledger is intact and valid.
Algorithm 1 Audit Proof Generation.
Input: 
( C h a l )
Output: 
( π I , σ I * , F ^ I , { F s , y s } s ( z ) )
  1:
Set S and π I 0
  2:
for  h = 1 ; h z ; h + +  do
  3:
    Compute s = ϕ 1 ( h , r 1 ) and I s / 10
  4:
    if ( m s Q I ) then
  5:
        Set S S { s }
  6:
        Compute u s H Prime ( name 2 | | s )
  7:
        Compute u ¯ s u I * / u s ( mod φ ( N ) )
  8:
        Calculate f s = j s , j W ( ρ j + m j ) k { j , s } u k
  9:
        Compute F s = g d f s ( mod N )
10:
        Compute y s = g d ( ρ s + m s ) ( mod N )
11:
        Compute b s = ϕ 2 ( h , r 2 )
12:
        Compute π I π I + b s m s
13:
    end if
14:
end for
15:
Compute f ^ I = k I ( ρ ^ k + σ ^ k ) l { I , k } u ^ k
16:
Compute F ^ I = g d f ^ I ( mod N )
Algorithm 2 Audit Proof Verification.
Input: 
( π I , σ I * , F ^ I , { F s , y s } s ( z ) )
Output: 
( flag = 1 / 0 )
  1:
Set a u ^ I = H prime ( name 1 | | I )
  2:
Set b u ¯ ^ I = u ^ * / u ^ I ( mod φ ( N ) )
  3:
Set y = g d ( ρ s ^ + σ I * ) ( mod N )
  4:
Compute x = δ * u ¯ ^ I / F ^ I ( mod N )
  5:
Compute δ I = Shamir ( x , y , a , b )
  6:
Set flag TagVerify ( pk , σ I * , δ I )
  7:
if  flag = 1  then
  8:
    for  i = 1 ; i z ; i + +  do
  9:
        Compute s i = ϕ 1 ( i , r 1 ) and I s i / 10
10:
        if ( m s i Q I ) then
11:
           Compute a u s i = H Prime ( name 2 | | s i )
12:
           Compute b u ¯ s i = u I * / u s i ( mod φ ( N ) )
13:
           Compute y y s i = g d ( ρ s i + m s i ) ( mod N )
14:
           Compute x x s i = σ I * u ¯ s i / F s i ( mod N )
15:
           Compute σ s i = Shamir ( x , y , a , b )
16:
           Compute b i = ϕ 2 ( i , r 2 )
17:
        end if
18:
    end for
19:
    if  i = 1 z ( σ s i e u s i / g ρ s i ) b i g π I ( mod N )  then
20:
        Set flag 0
21:
    end if
22:
end if

5. Security Analysis

Theorem 1.
(Correctness): The correctness property of our proposed scheme guarantees that proofs are accurately verified during the block query and auditing processes.
Proof. 
The correctness of this scheme relies on the underlying dual-level chameleon hash structure and dual-level authentication data structure. Specifically, both block query and blockchain auditing require first recovering the questioned original tag from the global aggregated label, and then conducting double-layer label verification and double-layer hash verification. The correctness of the proposed scheme is demonstrated in the following four steps:
Case 1 ( C o r r e c t C h a m e l e o n H a s h ): First, we have proved the correctness of the double-layer double-trapdoor chameleon hash function. For the inner layer,
h 2 , s = ( X I · Y I ) H 1 ( m s , Y I ) · g 1 r 2 , s = g 1 ( x 1 + y 1 ) · H 1 ( m s , Y I ) · g 1 r 2 , s = g 1 ( x 1 + y 1 ) · H 1 ( m s , Y I ) + r 2 , s .
For the outer layer,
h 1 , s = ( X · Y ) H 1 ( h 2 , s | | X I | | h s 1 , Y ) · g 1 r 1 , s = g 1 ( x + y ) · H 1 ( h 2 , s | | X I | | h s 1 , Y ) · g 1 r 1 , s = g 1 ( x + y ) · H 1 ( h 2 , s | | X I | | h s 1 , Y ) + r 1 , s .
Case 2 ( C o r r e c t T a g R e t r i e v a l ): Then, we have proved the correctness of the outer and inner layer tag retrieval by the Shamir’s Trick. Because we used H Prime ( · ) in it, it’s easy to get a tuple ( a I , b I ) , where by calculating gcd ( a I , b I ) = 1 and α I a I + β I b I = 1 . For the outer layer, we check x I a I = ? y I b I ( mod N ) , as follows.
x I a I = δ * u ¯ ^ I / F I ^ u ^ I ( mod N ) = i g ρ ^ i + σ i * u ^ i d u / g f ^ I u ^ I d = g i d ( ρ ^ i + σ i * ) k i u k / g i I d ( ρ ^ i + σ i * ) k i u k = g d ( ρ ^ I + σ I * ) k I u k = g d ( ρ ^ I + σ I * ) u ¯ ^ I ( mod N ) .
Specifically, when the conditions y I = g d ( ρ ^ I + σ I * ) and b I = u ¯ ^ I are met, the equation x I a I = y I b I ( mod N ) can be derived.
For the inner layer, when the conditions y s = g d ( ρ s + m s ) and b s = u ¯ s are met, the equation x s a s = y s b s ( mod N ) can be derived, as follows.
x s a s = σ I * u ¯ s / F s u s ( mod N ) = i g ρ i + m i u i d u / g f s u s d = g i d ( ρ i + m i ) k i u k / g i s d ( ρ i + m i ) k i u k = g d ( ρ s + m s ) k s u k = g d ( ρ s + m s ) u ¯ s ( mod N ) .
Case 3 ( C o r r e c t Q u e r y ): We demonstrate the correctness of block query procedure: For the outer layer,
δ I e u ^ I = y I α I a I x I β I a I e = g ( ρ ^ I + σ I * ) ( mod N ) .
For the inner layer,
σ s e u s = y s α s a s x s β s a s e = g ( ρ s + m s ) ( mod N ) .
Case 4 ( C o r r e c t A u d i t ): The final step of our proof demonstrates the correctness of the blockchain auditing protocol. We begin by assuming V A has successfully retrieved the tags { σ s i } for all challenged block items { m s i } specified by
i = 1 z σ s i e u s i / g h s i b i = i = 1 z g h s i + m s i u s i d e u s i / g h s i b i = i = 1 z g ( h s i + m s i ) / g h s i b i = g i = 1 z b i m s i ( mod N ) .
C h a l = { ( s i , b i ) } i [ z ] , we can get Equation (26).
If ρ = i = 1 z b i m s i , we can get that
i = 1 z σ s i e u s i / g h s i b i = g ρ ( mod N ) .
Based on the four cases proven above, we can conclude that the proposed scheme correctly handles both block query and auditing.    □
Theorem 2.
(Soundness): If the RSA problem remains hard and both hash functions, H 1 ( · ) and H prime ( · ) , provide collision resistance, then under the random oracle model, our scheme achieves soundness for its block query and blockchain auditing protocol.
Proof. 
Since a block query is a special case of the block auditing protocol, the soundness of the former can be reduced to the soundness of the latter. In what follows, we will construct a series of a sequence of cryptographic games to prove the security of the blockchain auditing protocol.
Game 0 : We define the initial game, Game 0 as the interactive soundness game established in the threat model section.
Game 1 : This game is a slight modification of Game 0 , where the challenger C now maintains two lists during the execution of game: a list L i n n e r to record all legitimately generated inner tags σ i , and a list L o u t e r for all legitimately generated outer tags δ I . The game is terminated and C declares a failure if the adversary A submits a proof tuple ( m s , F s , σ I * , F ^ I ) that enables C to retrieve a tag δ I , such that this retrieved tag δ I is not present in the list L o u t e r .
Assuming an adversary A achieves a non-negligible advantage ϵ > negl ( λ ) between Game 0 and Game 1 , we can construct a PPT adversary B . B can solve the underlying RSA problem with a probability of ϵ / q r o negl ( λ ) , where q r o denotes A ’s queries to the random oracle.
Setup phase, given an RSA instance ( N , e ¯ , y , y d ) to B , B ’s goal is to find z such that z e ¯ = y ( mod N ) . And  A first interacts with B by responding to its TagGen queries for various data items, which are organized into groups. We denote the set of groups for which A makes these legitimate, regular queries as T. Subsequently, A commits to a challenge set L, for which it will attempt to forge a global aggregated tag. We suppose that an admissible adversary A [37], who is expected to target a group J L , J T without ever querying it to the TagGen oracle. The simulator B then initializes H Prime as a random oracle. For all groups, it generates the corresponding outer layer primes: u ^ I = H P r i m e ( name 1 I ) for the regular groups I T , and  u ^ J = H P r i m e ( name 2 J ) for the challenge groups J L . The soundness of this hierarchical scheme fundamentally relies on the integrity of its outer aggregation layer. A successful forgery must, at its core, compromise an outer layer tag. Therefore, our proof logically focuses on reducing the soundness to the hardness of forging an outer layer tag. Among the oracle queries for the challenge groups, B guesses the group index J that A will target. It then sets the corresponding outer layer prime u ^ J e ¯ for this group and computes g as g = y I [ T ] u ^ I ( mod N ) . The resulting verification key ( N , g ) is then transmitted to A .
Query phase, B faithfully simulates the TagGen oracle. For any queries corresponding to the regular groups T, B generates and returns inner and outer tags to A . Then A outputs a forgery, consisting of a global tag δ * and a proof tuple π = ( m s , F s , σ J * , F J ^ ) corresponding to a challenge query s within the challenge group J . If the check on π succeeds, B computes z; otherwise, it aborts.
z = Shamir x = ( δ * ) e J [ L ] , J J u ^ J , y , a = u ^ J , b .
and b = I [ T ] u ^ I J [ L ] ( ρ ^ J + σ J * ) K [ L ] , K J u ^ K .
We now prove that the computed z is a valid solution z u ^ J = y ( mod N ) . According to Shamir’s Trick lemma, we only need to demonstrate that two conditions hold: x a = y b ( mod N ) and gcd ( a , b ) = 1 . For the first condition.
x a = ( δ * ) e J [ L ] u ^ J = g J [ L ] ( ρ ^ J + σ J * ) · K [ L ] , K J u ^ K ( mod N ) = y I [ T ] u ^ I J [ L ] ( ρ ^ J + σ J * ) · K [ L ] , K J u ^ K ( mod N ) = y b ( mod N ) .
For the second condition, to prove gcd ( a = e ¯ , b ) = 1 , we note that e ¯ is a prime and b > e ¯ . Therefore, it is sufficient to show that b mod a 0 .
b mod a I T u ^ I J [ L ] ρ ^ J + σ J * k J u ^ K = I [ T ] u ^ I ρ ^ J + σ J * k J u ^ K mod a 0 .
As calculated in Equation (30), this inequality holds due to the collision resistance of the hash function H Prime ( · ) .
Since both conditions are met, B can successfully apply the extended euclidean algorithm to find integers ( α , β ) s.t. a α + b β = 1 . The final solution is then computed as z = y α x β , which is the correct e ¯ -th root of y.
z e ¯ = y a α x a β = y a α y b β = y a α + b β = y ( mod N )
This concludes the proof of soundness for the proposed scheme.    □
Theorem 3.
(Controlled redaction): The dual-layer dual-trapdoor chameleon hash scheme proposed in this paper ensures that only the owner holding the trapdoor key can redact the blockchain. This scheme can effectively resist adversaries using hash collisions to extract trapdoor keys or forge new collisions.
Proof. 
The security of the proposed scheme is derived from its dual-level chameleon hashing structure. Specifically, the mechanism must address three critical challenges: first, preventing an adversary without a key from computing a hash collision to perform illicit modifications; second, ensuring that collision-based modifications can only be executed by the authorized redactor holding the trapdoor key; and third, mitigating malicious operations that could result from a compromised or leaked secret key. The security of our scheme can be directly attributed to three corresponding properties of the underlying double-trapdoor chameleon hash family [34]: First, its collision resistance makes it computationally infeasible for an adversary without a key to find a hash collision, thus preventing the illicit modifications outlined in the first challenge. Second, the trapdoor collision property ensures that only the authorized redactor holding the trapdoor key can efficiently compute such collisions, thereby satisfying the second requirement. Finally, key-exposure freeness guarantees that a compromised secret key cannot be used to forge collisions for hashes generated with other keys, effectively mitigating the third risk.
Due to space limitations, we omit the detailed proof. For more details, please refer to the reference [34].    □

6. Performance Analysis

In this section, we evaluate the performance of the proposed scheme from both theoretical analysis and implementation.

6.1. Theoretical Analysis

To better evaluate the performance, we selected Scheme [25] and Scheme [26] as comparative experiments, and defined some symbols in Table 2. Based on these definitions, we proceed to analyze the selected scheme’s communication and storage costs (Table 3) and compare the computational overhead against the selected schemes (Table 4).
In the system setup phase, the computation costs are 1M +  2 q H + 3NExp for [25], and 1M + H + 3EC + 2Exp for [26], while our proposed scheme requires 1M + H + 3Exp to generate the parameters for the dual-layer dual-trapdoor chameleon hash and tags. Meanwhile, the additional communication cost of our scheme is 4 | Z p | + 2 | Z N | + 4|G|, which is not significantly different from the other two. Therefore, our scheme has an advantage in the initialization phase.
In the block append phase, compared to the 1H + q(2H + Exp) required by [25] and the 2H + 2EC + 2Exp by [26], our scheme on average requires 2H + (1 + 1/k)(H + H p ) + (5 + 1 + 1/k)Exp to calculate the dual-layer chameleon hash and bind the block to the dual-level authentication data structure, which enables both effective permission supervision and lightweight storage. Additionally, a computational cost of ( 2 l + 1 + 1)H + 6Exp is required in our scheme to validate the new block. Meanwhile, the communication cost is constant for all schemes.
In the block redaction phase, the redaction cost is 2H + ( + 1 )(H + Exp) for [25] and 2 H p + H + EEA + 9Exp + 2EC for [26]. And the redaction cost of our scheme is 4EEA + 3Exp + 3H, verification cost is ( 2 l + 1 + 1)H + 6Exp. Because our scheme not only computes hash collisions but also two tag update operations, which ensures that the tag is always bound to the most up-to-date on-chain data. Meanwhile, the communication cost is constant for all schemes in the block redaction.
Block queries can be divided into a proof generation phase and a verification phase. For the proof generation phase, the computation cost is q H + (2N − 1)Exp for [25] and ( k + n / k ) H p + 2Exp for our scheme. In our scheme, the proof generation cost is related to k and n. When the number of elements k within a cycle is fixed, the time cost increases with an increasing number of blocks n. The more blocks there are on the blockchain, the longer it takes to generate a proof. Conversely, when n is fixed, the smaller the value of k, the longer the proof generation time. For the proof verification phase. In contrast to [26], which requires returning the entire chain, our scheme and [25] achieve a constant-level verification cost, which ensures that the cost does not increase with the growth of the blockchain. For the communication cost, Table 3 highlights a significant disparity: Scheme [26] exhibits a linear growth O ( n ) in data transmission as the blockchain length increases. In contrast, our scheme maintains a constant communication complexity O ( 1 ) , independent of the blockchain scale n. This theoretical advantage implies that the communication cost of the query process will be significantly reduced as on-chain blocks continue to grow.
Blockchain auditing can be divided into the proof generation and verification phases. For the proof generation phase, the computation cost is q ρ H + (2N − 1)Exp for [25] and (2z + c)Exp + (zk + c(n/k))H for our scheme. During the proof verification phase, the computation cost is (6z + 6c)Exp + (2c + 3z)EEA + (c(n/k) + z k )H for our scheme. In our scheme, the proof generation cost is related to k, z, and n. This is because a dual-level authentication data structure is adopted, which ensures that as the number of on-chain blocks increases, a larger k leads to a slower growth in cost.
Moreover, the FNs and LNs in our scheme incur an additional storage cost. This cost is composed of n(5 | G | + 2 | Z p | ) for the dual-level chameleon hashing structure and (⌊n/k⌋ + 1) | Z N | ) for the dual-level authentication data structure. Notably, the latter component decreases as the parameter k increases. This total overhead is significantly smaller than the size of a standard block, thus achieving lightweight storage.
In terms of communication complexity, specifically for system setup, block appending, content redaction, and block query, the  communication overhead (i.e., the size of transmitted proofs and tags) remains constant. This ensures that the bandwidth consumption for these routine operations is stable and completely independent of the blockchain length. Regarding the auditing phase, the communication cost is linearly correlated with the security parameter z to guarantee valid verification, yet it remains decoupled from the total ledger size. Furthermore, to minimize redundant data transmission, our architecture is designed to share on-chain “challenge-response” instances between the query and auditing protocols. This strategy effectively avoids the on/off-chain resource waste caused by repeated audit requests within the same period, thereby optimizing the overall bandwidth usage for distributed synchronization.
Parameter analysis (k and z): Based on the theoretical analysis above, the selection of parameters k and z presents a critical trade-off between security and computational efficiency. We conducted the following discussion:
  • Cycle Size (k): As indicated in the Block Query, Blockchain auditing and Storage analysis, increasing k significantly slows the growth rate of proof generation costs (dominated by the n / k term) and reduces the storage burden on Nodes. Therefore, for permissionless settings (where the chain length n grows indefinitely and storage is costly), a larger k is recommended to ensure scalability and minimize the size of global tags. Conversely, for permissioned settings with high-performance nodes, a smaller k is acceptable to achieve finer-grained permission.
  • Audit Challenge (z): Our analysis shows that the auditing cost increases linearly with z. However, a larger z is necessary to achieve higher confidence. As [12]’s work, when the proportion of corrupted blocks in the file under audit is 1%, the integrity auditing process achieves a precision of 95% when 300 blocks are sampled, which increases to 99% as the number of challenged blocks reaches 460. Consequently, In real-world deployments, users should prioritize security by selecting z = 460 for critical data, while z = 300 may suffice for general-purpose auditing where speed is prioritized.

6.2. Implementation

To visually assess performance, we designed and carried out a set of experiments that measure the cost of each scheme across various stages.
To evaluate the performance of the proposed scheme, we conducted relevant tests on the Windows 10 operating system, with hardware specifications including an 11th Gen Intel(R) Core(TM) i5-11500 CPU @ 2.70  GHz processor and 8.00 GB of RAM. The entire scheme was implemented using Python 3.11 . During implementation, we utilized Python’s standard hashlib library to perform hash computations, the cryptography library to generate R S A key pairs, and the sympy library to assist with certain auxiliary calculations. For cryptographic primitives, the scheme adopts S H A -256 as the standard hash function for generating block/transaction hashes. The master keys are based on the R S A algorithm, with a key length of 2048 bits. These parameter choices are made to meet the relevant security requirements. All experiments focus solely on measuring the execution time of the scheme’s core functionalities, excluding any communication overhead. To ensure the accuracy and stability of the results, each measurement was independently repeated 20 times, and the average value was recorded.
System Setup: At this phase, the time cost is spent on generating the parameters p p and creating the genesis block. In Figure 3a, the running time of the system setup operation is provided. As observed, the running time of schemes [25,26], and our scheme does not vary significantly with the number of transactions. Meanwhile, the computational cost of our scheme remains consistent for different values of k. The results of the experiment show that the system setup cost of all comparison schemes is independent of the number of transactions, and the system setup cost of our scheme is independent of the cycle size k.
Block Append: In Figure 3b, we can see that the computational cost of blockchain append in our scheme and [25,26] are both constant. Meanwhile, in our scheme, the block generation time for k = 20 is slightly lower than that for k = 10 , due to the reduced number of outer tag computations when there are more data entries within a group. From Figure 3c, the verification time for all three schemes is independent of the transaction volume. Overall, the additional overhead in the block append phase is acceptable.
Block Redaction: As shown in Figure 4, we can see that the redaction and verification cost of [25] increases as the index of the editing block increases, while the computational and verification cost of our scheme and [26] are both constant. Meanwhile, in our scheme, the size of k does not affect the redaction and verification costs. Because the group size has nothing to do with the redaction process. In Table 5, we compare the average running time of different correction processes under different numbers of group elements k (Since scheme [25,26] do not have this functionality, no comparison with them is involved). It can be seen that as the number of data entries k within a cycle increases, the time to correction is also constant, which is because the correction process only involves modifying the permissions of the erroneous blocks, and has nothing to do with the other blocks within the cycle.
Block Query: In Figure 5, the time cost is divided into proof generation and verification. For proof generation, ref. [26] needs to return the entire blockchain data, so the proof generation cost in Figure 5a is 0 s. The time cost for proof generation by [25] remains approximately constant at around 0.0793 s. In our scheme, proof generation involves all blockchain data entries, causing the time cost to grow as the number of blocks increases. Meanwhile, under different values of k, the larger the k, the slower the growth rate. This is consistent with our previous analysis. Furthermore, Figure 5b shows that the verification cost of our scheme and [25] are constant, while that of [26] increases linearly with the growth of the number of blocks. As a result, we can conclude that as the blockchain data grows, our query costs are within the acceptable range.
Blockchain Auditing: In Figure 6, the time cost is divided into auditing, proof generation, and verification. In Figure 6a, we tested the generation costs of proofs for different challenge blocks for various schemes. As observed, the time required for generating audit proofs for both our scheme and [25] will increase with the growing number of challenged blocks. (Since the scheme [26] does not have this functionality, no comparison with it is involved.) Furthermore, in the proof generation process, we will set the challenge blocks to 460. In Figure 6b,c, for both our scheme and Scheme [25], the overhead of proof generation and verification scales with the increasing number of blocks. In the proof generation phase, our scheme, under different values of k, the larger the k, the slower the growth rate, which is consistent with our previous analysis. Both schemes exhibit an increase in running time as the blockchain extends in length. However, our proposed scheme consistently requires more time compared to the other. This is because the majority of our computing costs are spent on retrieving the disputed block tags. Compared with the advantages of lightweight storage and permission supervision, the increase in the cost of the audit part is acceptable. This enables our solution to achieve the design goal of integrating lightweight storage, permission supervision, and public auditing.

6.3. Result Overview

Specifically regarding system setup and redaction, our scheme demonstrates constant computational complexity that is unaffected by transaction volume or blockchain length. Regarding block appending, although the computational overhead is slightly influenced by the cycle size k, it remains constant with respect to the blockchain length, ensuring stable performance independent of the growing ledger. Furthermore, the proposed design achieves minimal overhead for verification processes, offering a distinct efficiency advantage in these high-frequency maintenance operations compared to the comparative schemes.
Unlike the constant-time routine operations, the computational costs for block Query and auditing naturally increase with the growth of the blockchain ledger. Crucially, however, our experiments demonstrate that the cycle size parameter k serves as an effective tuning mechanism: as the blockchain scale expands, a larger k yields a slower growth rate in proof generation costs compared to a smaller k, thereby offering better scalability for large-scale deployments. Regarding the auditing phase, although the additional costs are non-negligible, they represent an acceptable trade-off for maintaining the rigorous security and stability of a redactable blockchain. Nevertheless, exploring more efficient authentication structures to further reduce verification time remains an important direction for our future work.

7. Discussion

Our scheme relies on a trusted Certificate Authority (CA) to manage the outer layer of the chameleon hash and supervise the redaction committee. In a consortium blockchain setting, the CA is typically a highly credible entity (e.g., a government regulator or a consortium board). To further strengthen the robustness of our system beyond the standard consortium assumptions, we provide a discussion on mitigating the potential risks associated with CA management. If the CA’s master secret key ( m s k ) is compromised, an adversary could arbitrarily modify the ledger, undermining the system’s immutability. To mitigate this risk, threshold cryptography can be introduced in the practical deployment. Instead of a single entity holding the complete m s k , the key can be split using a ( t , n ) threshold sharing scheme and distributed among n stakeholders. This ensures that the compromise of a single or a minority of CA nodes does not compromise the security of the entire system, thereby enhancing the robustness of the permission supervision.

8. Conclusions

We propose a verifiable and redactable blockchain with lightweight storage and permission supervision. This scheme integrates flexible block content redaction, lightweight storage, and dual-layer authority supervision based on a committee and a central authority. Additionally, it supports blockchain state verification, data querying, and auditing through hierarchical authentication tags, offering broad application prospects. Finally, experimental results demonstrate that tuning the cycle size k effectively reduces the computational overheads of querying and auditing, which is significant for improving the practicality of verifiable redactable blockchains.

Author Contributions

Conceptualization, M.M. and G.T.; methodology, M.M., X.Y. and G.T.; software, M.M. and X.Y.; validation, X.Y. and G.T.; writing—original draft preparation, M.M. and X.Y.; writing—review and editing, M.M., X.Y., G.T. and J.W.; visualization, X.Y., G.T. and J.W.; supervision, W.S., G.T. and M.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Nature Science Foundation of China under Grants (Nos. 62272386, 62402360 and 62572483), in part by the China National Postdoctoral Program for Innovative Talents (No. BX20240274), in part by the Shannxi Postdoctoral Program (No. 2024SQBC008), in part by the Key Research and Development Program of Shaanxi under Grant (No. 2024GX-ZDCYL-01-09), and in part by the Open Research Fund of Guangdong Key Laboratory of Blockchain Security, Guangzhou University.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Whitepaper. 2009. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 1 October 2023).
  2. Wood, G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper. 2014. Available online: https://ethereum.github.io/yellowpaper/paper.pdf (accessed on 4 February 2026).
  3. Möser, M.; Soska, K.; Heilman, E.; Lee, K.; Heffan, H.; Srivastava, S.; Hogan, K.; Hennessey, J.; Miller, A.; Narayanan, A.; et al. An Empirical Analysis of Traceability in the Monero Blockchain. arXiv 2018, arXiv:1704.04299. [Google Scholar] [CrossRef]
  4. Korpela, K.; Hallikas, J.; Dahlberg, T. Digital Supply Chain Transformation toward Blockchain Integration. In Proceedings of the 50th Hawaii International Conference on System Sciences, Big Island, HI, USA, 4–7 January 2017. [Google Scholar] [CrossRef]
  5. Krenn, S.; Pöhls, H.C.; Samelin, K.; Slamanig, D. Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications. In Progress in Cryptology—AFRICACRYPT 2018; Cryptology ePrint Archive, Paper 2018/971; Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
  6. Raikwar, M.; Mazumdar, S.; Ruj, S.; Sen Gupta, S.; Chattopadhyay, A.; Lam, K.Y. A Blockchain Framework for Insurance Processes. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–4. [Google Scholar] [CrossRef]
  7. Chen, J.; Yao, S.; Yuan, Q.; He, K.; Ji, S.; Du, R. CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 2060–2068. [Google Scholar] [CrossRef]
  8. Jia, M.; He, K.; Chen, J.; Du, R.; Chen, W.; Tian, Z.; Ji, S. PROCESS: Privacy-Preserving On-Chain Certificate Status Service. In Proceedings of the IEEE INFOCOM 2021—IEEE Conference on Computer Communications, Vancouver, BC, Canada, 10–13 May 2021; pp. 1–10. [Google Scholar] [CrossRef]
  9. Matzutt, R.; Hiller, J.; Henze, M.; Ziegeldorf, J.H.; Müllmann, D.; Hohlfeld, O.; Wehrle, K. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin. In Financial Cryptography and Data Security; Meiklejohn, S., Sako, K., Eds.; Springer: Berlin/Heidelberg, Germany, 2018; pp. 420–438. [Google Scholar] [CrossRef]
  10. Hou, B.; Chen, F. A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users. In Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), Singapore, 29 November–1 December 2020; pp. 1031–1043. [Google Scholar] [CrossRef]
  11. Schwerin, S. Blockchain and Privacy Protection in the Case of the European General Data Protection Regulation (GDPR): A Delphi Study. J. Br. Blockchain Assoc. 2018, 1, 1–77. [Google Scholar] [CrossRef] [PubMed]
  12. Ateniese, G.; Magri, B.; Venturi, D.; Andrade, E. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, 26–28 April 2017; pp. 111–126. [Google Scholar] [CrossRef]
  13. Ateniese, G.; de Medeiros, B. Identity-Based Chameleon Hash and Applications. In Financial Cryptography; Juels, A., Ed.; Springer: Berlin/Heidelberg, Germany, 2004; pp. 164–180. [Google Scholar] [CrossRef]
  14. Derler, D.; Samelin, K.; Slamanig, D.; Striecks, C. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. In Proceedings of the Network and Distributed Systems Security (NDSS) Symposium 2019, San Diego, CA, USA, 24–27 February 2019. Cryptology ePrint Archive, Paper 2019/406. [Google Scholar] [CrossRef]
  15. Ma, J.; Xu, S.; Ning, J.; Huang, X.; Deng, R.H. Redactable Blockchain in Decentralized Setting. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1227–1242. [Google Scholar] [CrossRef]
  16. Qin, H.; Duan, M.; Tang, Y.; Wang, M. Traceable Decentralized Policy-Based Chameleon Hash Scheme for Blockchain Rewriting. In Data Science; Xu, C., Pan, H., Yu, C., Wang, J., Han, Q., Song, X., Lu, Z., Eds.; Springer: Singapore, 2024; pp. 183–203. [Google Scholar] [CrossRef]
  17. Xu, S.; Ning, J.; Ma, J.; Xu, G.; Yuan, J.; Deng, R.H. Revocable Policy-Based Chameleon Hash. In Computer Security—ESORICS 2021; Bertino, E., Shulman, H., Waidner, M., Eds.; Springer: Cham, Switzerland, 2021; pp. 327–347. [Google Scholar] [CrossRef]
  18. Abdali, S.; Yusoff, M.N.; Hasan, H.F. Enhancing Efficiency and Fine-Grained Control in Redactable Blockchains with EPBCHF. Iraqi J. Comput. Sci. Math. 2024, 5, 194–212. [Google Scholar] [CrossRef]
  19. Panwar, G.; Vishwanathan, R.; Misra, S. ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems. In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies (SACMAT ’21); Association for Computing Machinery: New York, NY, USA, 2021; pp. 103–114. [Google Scholar] [CrossRef]
  20. Xu, S.; Ning, J.; Ma, J.; Huang, X.; Deng, R.H. K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4507–4520. [Google Scholar] [CrossRef]
  21. Li, Y.; Zhang, Z.; Chen, X.; Li, R.; Zhang, L. Redactable Blockchain with K-Time Controllable Editing. In Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, 9–11 December 2022; pp. 1455–1461. [Google Scholar] [CrossRef]
  22. Duan, J.; Wang, W.; Wang, L.; Gu, L. Controlled Redactable Blockchain Based on T-Times Chameleon Hash and Signature. IEEE Trans. Inf. Forensics Secur. 2024, 19, 7560–7572. [Google Scholar] [CrossRef]
  23. Tian, Y.; Li, N.; Li, Y.; Szalachowski, P.; Zhou, J. Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. In Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC ’20); Association for Computing Machinery: New York, NY, USA, 2020; pp. 813–828. [Google Scholar] [CrossRef]
  24. Jia, Y.; Sun, S.F.; Zhang, Y.; Liu, Z.; Gu, D. Redactable Blockchain Supporting Supervision and Self-Management. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (ASIA CCS ’21); Association for Computing Machinery: New York, NY, USA, 2021; pp. 844–858. [Google Scholar] [CrossRef]
  25. Tian, G.; Wei, J.; Kutyłowski, M.; Susilo, W.; Huang, X.; Chen, X. VRBC: A Verifiable Redactable Blockchain with Efficient Query and Integrity Auditing. IEEE Trans. Comput. 2023, 72, 1928–1942. [Google Scholar] [CrossRef]
  26. Shen, J.; Chen, X.; Liu, Z.; Susilo, W. Verifiable and Redactable Blockchains with Fully Editing Operations. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3787–3802. [Google Scholar] [CrossRef]
  27. Puddu, I.; Dmitrienko, A.; Capkun, S. μchain: How to Forget without Hard Forks. IACR Cryptol. ePrint Arch. 2017, 2017, 106. [Google Scholar]
  28. Deuber, D.; Magri, B.; Thyagarajan, S.A.K. Redactable Blockchain in the Permissionless Setting. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 124–138. [Google Scholar] [CrossRef]
  29. Xu, Z.; Luo, X.; Xue, K.; Wei, D.; Li, R. SEREDACT: Secure and Efficient Redactable Blockchain with Verifiable Modification. In Proceedings of the 2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS), Hong Kong, 18–21 July 2023; pp. 818–828. [Google Scholar] [CrossRef]
  30. Wu, X.; Du, X.; Wang, S.; Yang, Q.; Liu, A.; Wang, W. PRBC: A practical redactable blockchain incorporating chameleon hash functions with attribute control. J. Inf. Secur. Appl. 2025, 90, 104045. [Google Scholar] [CrossRef]
  31. Yang, Y.; Chen, Y.; Liu, Z.; Tan, C.; Luo, Y. Verifiable and Redactable Blockchain for Internet of Vehicles Data Sharing. IEEE Internet Things J. 2025, 12, 4249–4261. [Google Scholar] [CrossRef]
  32. Wang, W.; Peng, H.; Duan, J.; Wang, L.; Hu, X.; Zhao, Z. Resilient and Redactable Blockchain with Two-Level Rewriting and Version Detection. IEEE Trans. Inf. Forensics Secur. 2025, 20, 1163–1175. [Google Scholar] [CrossRef]
  33. Shamir, A. On the generation of cryptographically strong pseudo-random sequences. In Automata, Languages and Programming; Even, S., Kariv, O., Eds.; Springer: Berlin/Heidelberg, Germany, 1981; pp. 544–550. [Google Scholar] [CrossRef]
  34. Chen, X.; Zhang, F.; Susilo, W.; Mu, Y. Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. In Applied Cryptography and Network Security, Proceedings of the 5th International Conference on Applied Cryptography and Network Security (ACNS ’07); Springer: Berlin/Heidelberg, Germany, 2007; pp. 18–30. [Google Scholar] [CrossRef]
  35. Tian, G.; Wei, J.; Miao, M.; Guo, F.; Susilo, W.; Chen, X. Blockchain-Based Compact Verifiable Data Streaming with Self-Auditing. IEEE Trans. Dependable Secur. Comput. 2024, 21, 3917–3930. [Google Scholar] [CrossRef]
  36. Campanelli, M.; Fiore, D.; Greco, N.; Kolonelos, D.; Nizzardo, L. Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage. In Advances in Cryptology—ASIACRYPT 2020; Moriai, S., Wang, H., Eds.; Springer: Cham, Switzerland, 2020; pp. 3–35. [Google Scholar] [CrossRef]
  37. Goyal, R.; Vaikuntanathan, V. Locally Verifiable Signature and Key Aggregation. In Advances in Cryptology—CRYPTO 2022; Dodis, Y., Shrimpton, T., Eds.; Springer: Cham, Switzerland, 2022; pp. 761–791. [Google Scholar] [CrossRef]
Figure 1. The redactable blockchain structure. Note: This figure illustrates our dual-level chameleon hashing structure. The inner layer hash value h 2 , i is generated by a regulator for each cycle using their hash public key. The CA generates the outer hash value h 1 , i . This two-tier design enables effective supervision: regulators can perform routine redactions, while the CA can intervene to correct malicious edits and manage the regulator.
Figure 1. The redactable blockchain structure. Note: This figure illustrates our dual-level chameleon hashing structure. The inner layer hash value h 2 , i is generated by a regulator for each cycle using their hash public key. The CA generates the outer hash value h 1 , i . This two-tier design enables effective supervision: regulators can perform routine redactions, while the CA can intervene to correct malicious edits and manage the regulator.
Information 17 00176 g001
Figure 2. The processes of appending a new block B 9 and redacting black B 5 with B 5 (i.e., (k = 3)). Note: The green color represents block addition, the red color represents block redaction, and the dashed arrows represent aggregation calculations.
Figure 2. The processes of appending a new block B 9 and redacting black B 5 with B 5 (i.e., (k = 3)). Note: The green color represents block addition, the red color represents block redaction, and the dashed arrows represent aggregation calculations.
Information 17 00176 g002
Figure 3. Comparison of computation costs in the system setup and block append. (a) System setup; (b) Block append (bind); (c) Block append (verify).
Figure 3. Comparison of computation costs in the system setup and block append. (a) System setup; (b) Block append (bind); (c) Block append (verify).
Information 17 00176 g003
Figure 4. Comparisons of computation costs in the block redaction phases. (a) Redaction; (b) Verification.
Figure 4. Comparisons of computation costs in the block redaction phases. (a) Redaction; (b) Verification.
Information 17 00176 g004
Figure 5. Comparisons of computation costs in the block query phases. (a) Proof generation; (b) Proof verification.
Figure 5. Comparisons of computation costs in the block query phases. (a) Proof generation; (b) Proof verification.
Information 17 00176 g005
Figure 6. Comparisons of computation costs in the blockchain auditing phases. (a) Auditing; (b) Proof generation; (c) Proof verification.
Figure 6. Comparisons of computation costs in the blockchain auditing phases. (a) Auditing; (b) Proof generation; (c) Proof verification.
Information 17 00176 g006
Table 1. Comparisons of Redactable Blockchain.
Table 1. Comparisons of Redactable Blockchain.
SchemesSettingAuthorizationRedactorVerificationQueryAuditingSupervision
AMVA17 [12]Permissioned/lessCA/CommitteeCA/Committee××××
PDS17 [27]PermissionedCACA××××
DMT19 [28]PermissionlessN/AAll miners××××
DSSS19 [14]Permissioned/lessCA/UsersAuthorized users××××
PVN21 [19]PermissionedCAAuthorized users×××🗸
MXNH22 [15]PermissionedMulti-CAAuthorized users××××
XNMX21 [20]PermissionedCAAuthorized users×××🗸
JSZ21 [24]PermissionedCACA + All users×××🗸
LZCX22 [21]PermissionedCAAuthorized users×××🗸
TWKS22 [25]Permissioned/lessCA/CommitteeCA + Committee🗸🗸🗸×
SCLS23 [26]Permissioned/lessCA/CommitteeCA/Committee🗸×××
XLXW23 [29]Permissioned/lessCA/CommitteeAuthorized users🗸×××
WDW25 [30]PermissionedCAAuthorized users×××🗸
YCLT25 [31]PermissionedCommitteeCommittee + users🗸×××
WPDW25 [32]Permissioned/lessCommitteeCommittee + users🗸×××
Our schemePermissioned/lessCA/CommitteeCA + Committee🗸🗸🗸🗸
Table 2. Notations.
Table 2. Notations.
NotationDescription
nTotal count of blocks on the blockchain
mQuantity of transactions per standard block
qThe branching factor of the q-ary BAT
kNumber of blocks per cycle
NDimensionality of the family vector
zTotal nodes within the audited path union
cNumber of groups involved in the z data blocks under audit.
sNumber of redacted blocks
Height of the redacted/queried node within the BAT
lHeight of the MHT in the block
HCost overhead of running a hash function H
H p Cost overhead of hashing a string to a prime
MCost overhead of mining a standard block
ECThe cost of the elliptic curve algorithm
EEACost overhead of executing an extended euclidean algorithm
ExpCost overhead of an exponentiation operation
PairComputational cost for a bilinear pairing operation
| G | Storage size of the element in G
| Z p | Storage size of the element in Z p
| Z N | Storage size of the element in Z N
| T x | Storage size of the transaction in a standard block
| B H | Storage size of the block header in a standard block
Table 3. Comparisons Of Communication and Storage Costs.
Table 3. Comparisons Of Communication and Storage Costs.
SchemesCommunication CostsStorage Costs
SetupBindRedactQueryAuditingFNLN
VRBC 1 | B H | + 1 | B H | + 1 | B H | + 1 | B H | + z ( 1 | B H | + n ( | B H | + n ( | B H | )
[25] m | T x |   + 4 ( N + 1 ) | G | m | T x |   + 2 | Z p |   + ( q + 1 ) | G | m | T x |   + 2 ( | Z p |   +   | G | ) m | T x |   + 4 | Z p |   + ( + 4 ) | G | m | T x | ) + ( 3 + 1 ) ( | Z p |   +   | G | ) m | T x | ) + n ( | Z p |   + 3 | G | ) + n ( | Z p |   + 3 | G | )
SCLS 1 | B H | + 1 | B H | + 1 | B H | + n ( | B H | + - n ( | B H |   + m | T x | ) + n ( | B H | ) +
[26] m | T x |   + 3 | G |   +   | Z p |   + 2 | Z N | m | T x |   + 3 | G |   +   | Z p | m | T x |   + 10 | G |   + 3 | Z p | m | T x | ) + n ( 3 | G |   +   | Z p | ) ( n s ) ( 3 | G |   +   | Z p | ) + s ( 10 | G |   + 3 | Z p | ) ( n s ) ( 3 | G |   +   | Z p | ) + s ( 10 | G |   + 3 | Z p | )
Our 1 | B H |   + m | T x | 1 | B H |   + m | T x | 1 | B H |   + m | T x | 1 | B H |   + m | T x | z ( 1 | B H |   + m | T x | ) + 2 z | Z p | n ( 1 | B H |   + m | T x | ) n | B H |   + n ( 5 | G |   + 2 | Z p | )
scheme + 4 | Z p |   + 2 | Z N |   + 4 | G | + 2 | Z p |   + 4 | Z N |   +   | G | + | Z p |   + 4 | Z N |   + 2 | G | + 3 | Z N |   + 5 | G |   + 2 | Z p | + ( 5 z + c ) | G |   + ( c z + 2 z ) | z | + n ( 5 | G |   + 2 | Z p | ) + ( n / k + 1 ) | Z N | + ( n / k + 1 ) | Z N |
Table 4. Comparisons Of Computation Costs.
Table 4. Comparisons Of Computation Costs.
SchemesSystem SetupBlock AppendBlock RedactionBlock QueryBlockchain Auditing
BindVerifyRedactVerifyProveVerifyProveVerify
VRBC 1 M + 2 q H 1 H + q ( 2 H ( 2 l + 1 + q ) H 2 H + ( + 1 ) ( 2 l + 1 + ) H q H + ( 2 N 2 l + 1 H + 1 H q ρ H + ( 2 N ρ ( 2 l + 1 + l ) H
[25] + 3 N E x p + E x p ) + 1 H + ( N + 1 ) E x p ( H + E x p ) + ( + 1 ) E x p 1 ) E x p + ( + 2 ) ( E x p + P a i r ) 1 ) E x p ( ρ + 1 ) ( E x p + P a i r )
SCLS 1 M + H 2 H + 2 E C + 2 E x p ( 2 l + 1 + 1 ) H 2 H p + H + E E A ( 2 l + 1 + 1 ) H - n ( ( 2 l + 1 + 1 ) H --
[26] + 3 E C + 2 E x p + 2 E C + 2 H p + 9 E x p + 2 E C + 2 E C + 2 H p + H p + 2 E C ) + E x p
Our 1 M + H 2 H + ( 1 + 1 / k ) ( 2 l + 1 + 1 ) H 4 E E A ( 2 l + 1 + 1 ) H ( k + n / k ) H p 2 H p + 2 H ( 2 z + c ) E x p ( 6 z + 6 c ) E x p
scheme + 3 E x p ( H + H p ) + ( 5 + 1 / k ) E x p + 6 E x p + 3 H + 3 E x p + 6 E x p + 2 E x p + 4 E E A + 14 E x p + ( z k + c ( n / k ) ) H + ( 2 c + 3 z ) E E A + ( c ( n / k ) + z k ) H
Table 5. Comparisons of computation costs in the Correction.
Table 5. Comparisons of computation costs in the Correction.
k10203040
Runtime (s)0.03750.038640.037910.03913
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Miao, M.; Yang, X.; Wei, J.; Tian, G.; Susilo, W. A Verifiable and Redactable Blockchain with Lightweight Storage and Permission Supervision. Information 2026, 17, 176. https://doi.org/10.3390/info17020176

AMA Style

Miao M, Yang X, Wei J, Tian G, Susilo W. A Verifiable and Redactable Blockchain with Lightweight Storage and Permission Supervision. Information. 2026; 17(2):176. https://doi.org/10.3390/info17020176

Chicago/Turabian Style

Miao, Meixia, Xueyi Yang, Jianghong Wei, Guohua Tian, and Willy Susilo. 2026. "A Verifiable and Redactable Blockchain with Lightweight Storage and Permission Supervision" Information 17, no. 2: 176. https://doi.org/10.3390/info17020176

APA Style

Miao, M., Yang, X., Wei, J., Tian, G., & Susilo, W. (2026). A Verifiable and Redactable Blockchain with Lightweight Storage and Permission Supervision. Information, 17(2), 176. https://doi.org/10.3390/info17020176

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop