Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(27 citation statements)
references
References 53 publications
0
27
0
Order By: Relevance
“…Specifically to tackle the problem of arbitrary harmful data insertions in the blockchain, the notion of redacting the contents of a blockchain was first proposed by Ateniese et al [13]. The authors propose a solution more focused on the permissioned blockchain setting 2 based on chameleon hashes [18]. In their protocol, a chameleon hash function replaces the regular SHA256 hash function when linking consecutive blocks in the chain.…”
Section: State Of the Artmentioning
confidence: 99%
“…Specifically to tackle the problem of arbitrary harmful data insertions in the blockchain, the notion of redacting the contents of a blockchain was first proposed by Ateniese et al [13]. The authors propose a solution more focused on the permissioned blockchain setting 2 based on chameleon hashes [18]. In their protocol, a chameleon hash function replaces the regular SHA256 hash function when linking consecutive blocks in the chain.…”
Section: State Of the Artmentioning
confidence: 99%
“…The deleted or redacted block will bring the changed hash link. Most of the present redactable schemes utilize a hash mechanism called chameleon hash [9] to keep the same hash link relationship between the neighboring blocks. The first approach which uses the chameleon hash is proposed by Ateniese et al In their proposed scheme [10], when the altered or edited block brings the changed hash link, they use the chameleon hash to calculate the collision.…”
Section: A Ralated Workmentioning
confidence: 99%
“…We then present the proposed instantiation, provide the implementation and evaluation analysis. First, to initiate CHET, we could use chameleon hash construction in [19], which is discrete logarithm (DL) based. Meanwhile, the RSAbased and DL-based chameleon hash equipped with bilinear map [19] should also be suitable.…”
Section: Instantiation and Implementationmentioning
confidence: 99%