RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain
Abstract
:1. Introduction
- Enhanced Data Governance: By incorporating mechanisms for reviewing and deleting on-chain data, it prevents the spread of false or illegal information, thereby improving the credibility and security of the system.
- Improved Privacy Protection: It allows users to delete or modify on-chain private information under specific conditions, ensuring compliance with relevant laws and regulations while safeguarding user data.
- Support for Dynamic Data Updates: Through flexible data redaction functionalities, it enables secure and verified mechanisms for data modification or updates, facilitating dynamic management of on-chain information and effectively overcoming application bottlenecks of traditional alliance chains in data update scenarios.
- Operational Flexibility: The ability to update data enhances the adaptability of alliance chain systems to evolving demands, making them more efficient and user-friendly.
- The K-medoids clustering algorithm is employed to select the redaction center and consensus committees, and a redaction request verification algorithm is developed. The redaction center utilizes this algorithm to review redaction requests, preventing unreasonable block redaction. Subsequently, the consensus committees can simultaneously perform consensus operations to execute block redaction or block consensus, thereby improving consensus efficiency. Moreover, the consensus committees hold key information, preventing the misuse of redaction rights.
- A system master key generation algorithm, a user sub-key generation algorithm, and a key update algorithm are designed. A chameleon hash algorithm with updatable sub-keys is proposed, enabling the system master key to revoke a user’s redaction rights by updating their sub-key. Additionally, a dual-hash function scheme is constructed, wherein standard hash values generated by a conventional hash function are used for redaction transactions, while a chameleon hash function with updatable sub-keys is applied to generate hash values for non-redaction transactions.
- A block redaction strategy is designed, which is divided into four phases: initialization, block generation, block redaction, and key update. The execution process of nine algorithms is developed, including the redaction request generation algorithm, collision algorithm, key update algorithm, and others.
2. Related Work
3. Redactable Model
3.1. Architecture
- User Node: This entity represents a user of the system, participating in the initiation and verification of various transactions. Transactions initiated by user nodes are primarily categorized into two types: redaction transactions and non-redaction transactions. The redaction transaction requires prior review by the redaction center before being executed by the consensus nodes, rather than being directly processed by the consensus nodes.
- Consensus node: This entity acts as the executor of block operations. When a transaction involves block modification, the consensus node performs the corresponding redaction operations. Conversely, the consensus node is responsible for packaging all transactions to generate a new block.
- Redaction Center: This entity serves as the reviewer for redaction requests. The Redaction Center is responsible for verifying the validity of redaction requests and assessing the reasonableness of the proposed redaction. Once approved, the Redaction Center generates the corresponding redaction transaction, signs it, and forwards it to the consensus nodes for transaction packaging and block redaction.
- Consensus Committee: This entity is composed of all consensus nodes. The Consensus Committee conducts transaction consensus through a consensus algorithm to ensure block consistency across all nodes. In addition, the Consensus Committee maintains the key information of the chameleon hash functions within all blocks, including the system’s master key pair and all users’ subordinate key pairs.
3.2. Model Design
3.2.1. Review and Consensus Mechanism
- (1)
- Grouping method of consensus nodes
- (2)
- Methods for Constructing the Redactorial Center and Consensus Committee
3.2.2. Security Scheme of Double Hash Functions
3.2.3. Redactable Strategies
- (1)
- Initialization Phase (Algorithms 1–3)
Algorithm 1: Initialization algorithm |
The input is a security parameter, and the output is a public parameter. The algorithm is constructed based on two fundamental chameleon hash functions, and . First, the algorithm runs the initialization algorithms and , respectively, obtaining the public parameters and . Then, the algorithm sets the public parameter is . Finally, the algorithm output is . |
Algorithm 2: The master key generation algorithm |
The input is the public parameter. The algorithm uses the key generation algorithm of to generate a key pair . Then, the algorithm sets the system master key pair is . Finally, the algorithm outputs are . |
Algorithm 3: The subkey generation algorithm |
The input is the public parameter. First, the algorithm uses the key generation algorithm of to generate a key pair . Then, the algorithm set the user subkey pair is . Finally, the algorithm outputs are . |
- (2)
- Block Generation Phase (Algorithms 4 and 5)
Algorithm 4: The hash algorithm |
The inputs consist of the master public key , the sub-public key , and the message . First, the algorithm computes a hash value and verification string using the hash algorithm of the . Then, it calculates another hash value and verification string using the hash algorithm of the . Where, is formed by concatenating the hash value and the state identifier , where the state identifier is . The algorithm sets the tuple containing the hash value, verification string, and state identifier is . Finally, the algorithm outputs are . |
Algorithm 5: The hash verification algorithm |
The inputs consists of the main public key , hash value , status flag , subkey public key , verification string combination , and message . First, the algorithm checks if the current matches . If they do not match, the verification fails, and the algorithm directly sets the verification value and output . Otherwise, the algorithm computes the verification value using the hash verification algorithm of the , followed by computing the verification value using the hash verification algorithm of the . Finally, the algorithm sets the verification value and output . |
- (3)
- Block Redaction Phase (Algorithms 6–8)
Algorithm 6: The redaction request generation algorithm |
The inputs are a message , user key , hash value , checksum combination , status flag , and new message . The algorithm sets the redaction request , then outputs . |
Algorithm 7: The redaction request verification algorithm |
The input is the redaction request. The algorithm is executed by the redaction center. Upon receiving the , the algorithm first uses the hash verification algorithm to verify whether the information matches. If it does not match, the algorithm directly output . Conversely, if it matches, the algorithm proceeds to review the content of the new message . If the review is successful, the algorithm sets the redaction transaction and outputs , where the redaction flag is the signature of the redaction center. Conversely, if the review fails, the algorithm output is . |
Algorithm 8: The redaction algorithm |
The inputs consists of the secret key , the hash value , the checksum combination , the message , the subkey public key , and the new message . However, the secret key input can either be the master key or the user key . When the user key is provided as input, the algorithm utilizes the collision algorithm of to compute a random value . Subsequently, the algorithm sets the verification string combination and outputs . Conversely, when the master key is used as input, the algorithm first calculates the hash value and verification string via the hashing algorithm of . The algorithm then employs the collision algorithm of to compute the verification string . Finally, it sets the verification string combination and outputs . |
- (4)
- Key Update Phase (Algorithm 9)
Algorithm 9: The key update algorithm |
The inputs consist of the master key , hash value , checksum combination , message , user public key , and status flag , with and . First, the algorithm computes the key pair using the key generation algorithm from . Then, the algorithm calculates the hash value and checksum using the hash algorithm from . Next, the algorithm computes the new checksum using the collision algorithm from , where . Finally, the algorithm sets the checksum combination and the new key pair , and outputs . |
4. Experiments and Discussion
4.1. Safety Analysis
4.1.1. Correctness
4.1.2. Original Key Collision Resistance
4.1.3. Updated Key Collision Resistance
4.1.4. The Subkey Updatability
4.1.5. The Non-Updatability of the Master Key
4.2. Experimental Results and Analysis
4.2.1. Experimental Environment
4.2.2. Function Comparison
4.2.3. Algorithm Performance
4.2.4. Model Performance
- (1)
- Execution Time of the Transaction
- (2)
- Block Size of Transactions
- (3)
- Execution Time of Redaction
5. Conclusions
- A redaction review and consensus mechanism for alliance chain is proposed. The K-medoids clustering algorithm is used to select the redaction center and multiple consensus committees. The redaction center utilizes a redaction request verification algorithm to conduct redaction reviews, while the consensus committees are grouped to perform block redaction and block consensus.
- A chameleon hash algorithm with updatable subkeys is proposed. The system master key enables the revocation of a user’s redaction rights by updating their subkey. Based on this, a dual-hash function scheme is implemented, enabling the chameleon hash function to work in coordination with standard hash functions.
- A redaction strategy is proposed to realize an RBAU model that supports redaction review, redaction accountability, personal data management, and subkey updates. Security analysis demonstrates the model’s security, and experimental results indicate that the performance of the RBAU is comparable to that of the FISCO alliance chain.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Kouhizadeh, M.; Saberi, S.; Sarkis, J. Blockchain technology and the sustainable supply chain: Theoretically exploring adoption barriers. Int. J. Prod. Econ. 2021, 231, 107831. [Google Scholar] [CrossRef]
- Sanka, A.I.; Cheung, R.C.C. A systematic review of blockchain scalability: Issues, solutions, analysis and future research. J. Netw. Comput. Appl. 2021, 195, 103232. [Google Scholar] [CrossRef]
- Jiang, Y.; Xu, X.L.; Gao, H.H.; Rajab, A.D.; Xiao, F.; Wang, X.H. LBlockchainE: A Lightweight Blockchain for Edge IoT-Enabled Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2023, 24, 2307–2321. [Google Scholar] [CrossRef]
- Andola, N.; Raghav; Yadav, V.K.; Venkatesan, S.; Verma, S. Anonymity on blockchain based e-cash protocols-A survey. Comput. Sci. Rev. 2021, 40, 100394. [Google Scholar] [CrossRef]
- Zhou, S.S.; Li, K.C.; Xiao, L.J.; Cai, J.H.; Liang, W.; Castiglione, A. A Systematic Review of Consensus Mechanisms in Blockchain. Mathematics 2023, 11, 2248. [Google Scholar] [CrossRef]
- Zhang, T.; Huang, Z.G. Blockchain and central bank digital currency. Ict Express 2022, 8, 264–270. [Google Scholar] [CrossRef]
- Chinnasamy, P.; Babu, G.C.; Ayyasamy, R.K.; Amutha, S.; Sinha, K.; Balaram, A. Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques. Sensors 2024, 24, 6143. [Google Scholar] [CrossRef]
- Soltanisehat, L.; Alizadeh, R.; Hao, H.J.; Choo, K.K.R. Technical, Temporal, and Spatial Research Challenges and Opportunities in Blockchain-Based Healthcare: A Systematic Literature Review. IEEE Trans. Eng. Manag. 2023, 70, 353–368. [Google Scholar] [CrossRef]
- Chinnasamy, P.; Ayyasamy, R.K.; Tiwari, V.; Dhanasekaran, S.; Santhosh Kumar, B.; Sivaprakasam, T. Blockchain Enabled Privacy-Preserved Supply-Chain Management for Tracing the Food Goods. In Proceedings of the 2024 International Conference on Science Technology Engineering and Management (ICSTEM), Coimbatore, India, 26–27 April 2024. [Google Scholar]
- Cao, B.; Wang, Z.X.; Zhang, L.; Feng, D.Q.; Peng, M.G.; Zhang, L.; Han, Z. Blockchain Systems, Technologies, and Applications: A Methodology Perspective. IEEE Commun. Surv. Tutor. 2023, 25, 353–385. [Google Scholar] [CrossRef]
- Ressi, D.; Romanello, R.; Piazza, C.; Rossi, S. AI-enhanced blockchain technology: A review of advancements and opportunities. J. Netw. Comput. Appl. 2024, 225, 103858. [Google Scholar] [CrossRef]
- Wang, X.Y.; Chen, Y.N.; Zhu, X.H.; Li, C.; Fang, K. A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates. Appl. Sci. 2024, 14, 832. [Google Scholar] [CrossRef]
- Hu, J.W.; Huang, K.Q.; Bian, G.Q.; Cui, Y.P. Redact4Trace: A solution for auditing the data and tracing the users in the redactable blockchain. Comput. Netw. 2024, 245, 110360. [Google Scholar] [CrossRef]
- Sun, J.X.; Zhao, R.; Yin, H.R.; Cai, W. Incentive Mechanism for Redactable Blockchain Governance: An Evolutionary Game Approach. IEEE Trans. Comput. Soc. Syst. 2024, 11, 6953–6965. [Google Scholar] [CrossRef]
- Huang, K.; Zhang, X.S.; Mu, Y.; Rezaeibagha, F.; Du, X.J.; Guizani, N. Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Inform. 2020, 16, 2677–2686. [Google Scholar] [CrossRef]
- Ye, T.; Luo, M.; Yang, Y.; Choo, K.K.R.; He, D.B. A Survey on Redactable Blockchain: Challenges and Opportunities. IEEE Trans. Netw. Sci. Eng. 2023, 10, 1669–1683. [Google Scholar] [CrossRef]
- Wei, J.N.; Zhu, Q.H.; Li, Q.M.; Nie, L.S.; Shen, Z.Y.; Choo, K.K.R.; Yu, K.P. A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things. IEEE Internet Things J. 2022, 9, 17901–17911. [Google Scholar] [CrossRef]
- Yang, Y.X.; Chen, Y.L.; Liu, Z.Q.; Tan, C.Y. Verifiable and Redactable Blockchain for Internet of Vehicles Data Sharing. IEEE Internet Things J. 2025, 12, 4249–4261. [Google Scholar] [CrossRef]
- Yang, S.X.; Li, S.W.; Chen, W.J.; Zhao, Y.W. A Redactable Blockchain-Based Data Management Scheme for Agricultural Product Traceability. Sensors 2024, 24, 1667. [Google Scholar] [CrossRef]
- Zhang, T.S.; Zhang, L.Y.; Wu, Q.; Mu, Y.; Rezaeibagha, F. Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records. IEEE Syst. J. 2023, 17, 1962–1973. [Google Scholar] [CrossRef]
- Yuan, Y.; Wang, F.Y. Editable Blockchain: Models, Techniques and Methods. Acta Autom. Sin. 2020, 46, 831–846. [Google Scholar]
- Ateniese, G.; Magri, B.; Venturi, D. Redactable blockchain–or–rewriting history in bitcoin and friends. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, 26–28 April 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 111–126. [Google Scholar]
- Huang, K.; Zhang, X.; Mu, Y.; Rezaeibagha, F.; Du, X. Scalable and redactable blockchain with update and anonymity. Inf. Sci. 2021, 546, 25–41. [Google Scholar] [CrossRef]
- Peng, J.; Liu, C.; Hao, K.; Yu, M.H.; Xing, J.C.; Jiang, C.Y. Research on Editable Blockchain Model Based on Temporal Index. J. Front. Comput. Sci. Technol. 2023, 17, 1180–1188. [Google Scholar]
- Lv, W.L.; Wei, S.J.; Yu, M.H.; Li, S.S. Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium. Chin. J. Comput. 2021, 44, 2016–2032. [Google Scholar]
- Wu, C.; Ke, L.; Du, Y. Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain. Inf. Sci. 2021, 548, 438–449. [Google Scholar] [CrossRef]
- Ma, J.; Xu, S.; Ning, J. Redactable blockchain in decentralized setting. IEEE Trans. Inf. Forensics Secur. 2022, 17, 1227–1242. [Google Scholar] [CrossRef]
- Jia, M.; Chen, J.; He, K. Redactable Blockchain From Decentralized Chameleon Hash Functions. IEEE Trans. Inf. Forensics Secur. 2022, 17, 2771–2783. [Google Scholar] [CrossRef]
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Li, J.; Ma, H.; Wang, J. Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1653–1666. [Google Scholar] [CrossRef]
- Tian, Y.; Li, N.; Li, Y. Policy-based chameleon hash for blockchain rewriting with black-box accountability. In Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA, 7 December 2020; pp. 813–828. [Google Scholar]
- Jia, Y.; Sun, S.F.; Zhang, Y. Redactable blockchain supporting supervision and self-management. In Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Hong Kong, China, 4 June 2021; pp. 844–858. [Google Scholar]
- Ren, Y.L.; Zhai, M.J.; Hu, M.Q. Fair redactable blockchain supporting malicious punishment. J. Xidian Univ. 2023, 50, 203–212. [Google Scholar]
Literature | Redaction Function | Redaction Mode | Degree of Decentralization | Redaction Review |
---|---|---|---|---|
[22] | Chameleon hash | Physics | Centralization | Uncensorable |
[23] | Chameleon hash | Physics | Centralization | Uncensorable |
[24] | Timing index Chameleon hash | Logic | Centralization | Uncensorable |
[25] | Chameleon hash | Physics | Multicenter | Uncensorable |
[26] | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
[27] | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
[28] | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
[30] | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
[31] | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
[32] | Chameleon hash | Physics | Semi-decentralized | Review |
[33] | Chameleon hash | Physics | Semi-decentralized | Review |
Notation | Definition | Notation | Definition | Notation | Definition |
---|---|---|---|---|---|
node | Hash value | Data public key | |||
cluster | Common parameter | message | |||
Agency | Private key | Check string | |||
Redaction Center | System private key | Status flag | |||
Organization | Data private key | Test value | |||
Consensus Committee | Public key | Redact request | |||
Chameleon hash algorithmd | System public key |
Configuration | Server | Computer |
---|---|---|
Memory | 128 G | 32 G |
CPU | Intel Xeon Silver 4210(2) (Intel, Santa Clara, CA, USA) | i7-12700 |
Graphics card | RTX4090 | RTX3070 |
Hard disk | 6TSSD | 1TSSD + 1THDD |
OS | Ubuntu20.04/Win10 | Ubuntu20.04 |
Bandwidth | 300 M | 300 M |
Models | Blockchain-Based | Redaction Function | Redaction Mode | Degree of Decentralization | Redaction Review | Personal Data Management | Account- Ability | Key Update |
---|---|---|---|---|---|---|---|---|
Literature24 | Alliance chain | Timing index | Logic | Multicenter | N | N | Y | N |
Literature25 | Alliance chain | Chameleon hash | Physics | Multicenter | N | N | Y | N |
Literature31 | Public chain | Chameleon hash | Physics | Semi-decentralized | N | N | Y | N |
Literature32 | Public chain | Chameleon hash | Physics | Semi-decentralized | Y | Y | Y | Y |
Literature33 | Public chain | Chameleon hash | Physics | Semi-decentralized | Y | N | Y | Y |
Ours | Alliance chain | Chameleon hash | Physics | Multicenter | Y | Y | Y | Y |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, Y.; Guo, T.; Ren, Q.; Yang, X.; Chen, X.; Liu, S.; Zeng, F. RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain. Mathematics 2025, 13, 1474. https://doi.org/10.3390/math13091474
Chen Y, Guo T, Ren Q, Yang X, Chen X, Liu S, Zeng F. RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain. Mathematics. 2025; 13(9):1474. https://doi.org/10.3390/math13091474
Chicago/Turabian StyleChen, Yineng, Ting Guo, Qingshan Ren, Xiwen Yang, Xiaoxuan Chen, Shukun Liu, and Fanzai Zeng. 2025. "RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain" Mathematics 13, no. 9: 1474. https://doi.org/10.3390/math13091474
APA StyleChen, Y., Guo, T., Ren, Q., Yang, X., Chen, X., Liu, S., & Zeng, F. (2025). RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain. Mathematics, 13(9), 1474. https://doi.org/10.3390/math13091474