Content area
With the widespread application of alliance chain technology in diverse scenarios, its immutability has gradually revealed certain limitations in practical use. To address this challenge, a redactable alliance chain innovatively introduces functionalities for data modification, deletion, and updating. However, issues related to redaction permissions, auditing, and security hinder its development. To overcome these challenges, the K-medoids clustering algorithm is first employed to select a redaction center and a consensus committee. The redaction center reviews redaction requests, while the consensus committee groups redaction blocks and reaches block consensus. Next, a dual-hash function scheme is proposed, where a subkey-updatable chameleon hash function collaborates with a standard hash function. The system’s master key can revoke a user’s redaction rights by updating their subkey. Based on this framework, a block redaction strategy comprising four phases and nine execution algorithms is introduced, enabling an auditable, accountable, and subkey-updatable RBAU. Security analysis and experimental results demonstrate that the proposed model excels in correctness, resistance to collision of the original key, resistance to collision of the updated key, user subkey updatability, and master key immutability. Additionally, the algorithm’s execution time, transaction execution time, block size, and redaction time are comparable to those of the pre-improvement alliance chain.
Full text
1. Introduction
Since its introduction in 2008, blockchain technology, as a disruptive innovation, has demonstrated immense potential in the field of decentralized data management [1,2]. Blockchain organizes data in a unique “chain-like” structure by segmenting it into blocks and connecting them sequentially [3]. Each block not only records current transaction information but also contains the hash value of the preceding block, ensuring data integrity and tamper resistance [4]. In a decentralized network, all nodes collectively maintain the ledger and rely on consensus algorithms (such as Practical Byzantine Fault Tolerance (PBFT) and Proof of Work (PoW)) to verify and record transactions [5]. This trustless mechanism significantly reduces transaction costs while enhancing system efficiency and security.
With its characteristics of decentralization, immutability, and high transparency, blockchain has become a crucial tool for driving digital transformation [6]. In Blockchain 3.0, the application of alliance chain is continuously expanding. It addresses numerous challenges associated with trust and security in traditional centralized systems and has been widely applied in fields such as fintech, supply chain management, healthcare, elderly care, energy trading, intellectual property protection, and food traceability [7,8,9,10]. By leveraging distributed ledgers and consensus mechanisms, alliance chain ensures data integrity and reliability without the need for third-party intermediaries.
However, as alliance chain evolves rapidly and its application scenarios grow more complex, its core feature of immutability has revealed a series of limitations in practical use, particularly in areas such as data regulation, privacy protection, and dynamic data management.
Firstly, in terms of data regulation, the openness of alliance chain allows users to freely upload data. While this promotes information sharing and transparency, it also introduces potential risks of unverified data. False, malicious, or erroneous data may enter the alliance chain and spread across the network, posing significant threats to public safety or the normal functioning of systems [11]. For instance, in the context of the Internet of Vehicles, inaccurate traffic data could directly endanger driving safety or lead to traffic accidents. Therefore, how to implement the review and removal of inappropriate data on the alliance chain has become a core issue in data management.
Secondly, data privacy protection has emerged as an unavoidable challenge in alliance chain applications. Although alliance chain safeguards the security of data transmission and storage through encryption technologies, its immutability makes it impossible to delete sensitive information stored on the chain, potentially leading to privacy breaches or misuse by malicious actors. Within the framework of personal information protection regulations, such as the General Data Protection Regulation (GDPR), alliance chain systems need to support the deletion of records containing private data to comply with regulatory requirements and enhance user trust [12].
Lastly, regarding data updates, traditional alliance chains lack flexible modification mechanisms, making dynamic management extremely difficult. For example, when a user’s identity is preemptively registered by a malicious attacker or when errors exist in on-chain data, the immutability of traditional alliance chains prevents legitimate users from correcting or updating the relevant information [13]. This limitation significantly reduces the adaptability and efficiency of alliance chain in dynamic, real-world application scenarios.
To this end, redactable blockchain has gradually become a focal point in blockchain technology research and application, providing innovative solutions to address the limitations of flexibility and privacy protection. Redactable blockchain retains the decentralized and highly secure nature of alliance chains while introducing functionalities for data modification, deletion, and updating. By leveraging encryption technologies and optimized consensus mechanisms, it ensures the security and transparency of the data redaction process [14,15]. Compared to traditional alliance chain, redactable alliance chain offers the following advantages: Enhanced Data Governance: By incorporating mechanisms for reviewing and deleting on-chain data, it prevents the spread of false or illegal information, thereby improving the credibility and security of the system. Improved Privacy Protection: It allows users to delete or modify on-chain private information under specific conditions, ensuring compliance with relevant laws and regulations while safeguarding user data. Support for Dynamic Data Updates: Through flexible data redaction functionalities, it enables secure and verified mechanisms for data modification or updates, facilitating dynamic management of on-chain information and effectively overcoming application bottlenecks of traditional alliance chains in data update scenarios. Operational Flexibility: The ability to update data enhances the adaptability of alliance chain systems to evolving demands, making them more efficient and user-friendly.
Redactable alliance chains allow users to modify, delete, or update on-chain data under specific conditions by a flexible redaction mechanism. The implementation of such technology typically relies on advanced cryptographic tools and multi-party consensus mechanisms, such as chameleon hashes and zero-knowledge proofs, to ensure the security, transparency, and auditability of data redaction. This innovation opens new possibilities for the diverse application of alliance chain technology [16,17].
Redactable alliance chains demonstrate broad application prospects across various fields. It can be used in the IoV to dynamically correct traffic data, ensuring driving safety [18]. It can also be applied in food traceability to eliminate harmful or counterfeit information within the supply chain [19]. Additionally, it can be used in healthcare data management to ensure the effective protection of patient privacy while enabling dynamic updates [20]. However, research on redactable alliance chain also faces numerous challenges, such as how to ensure the allocation and management of redaction rights, how to design an efficient redaction consensus mechanism, and how to achieve privacy protection while maintaining data transparency.
Therefore, this paper implements redactable alliance chains using a dual-hash function and ensures accountability of the redaction process through a hash function that can be updated via sub-keys. In addition, a consensus group partitioning method is employed to establish a multi-center alliance chain, with a redaction center responsible for review. This approach not only addresses the limitations of traditional alliance chains, which cannot redact data, but also effectively improves the redaction efficiency of the alliance chain. The main contributions of this paper are as follows: The K-medoids clustering algorithm is employed to select the redaction center and consensus committees, and a redaction request verification algorithm is developed. The redaction center utilizes this algorithm to review redaction requests, preventing unreasonable block redaction. Subsequently, the consensus committees can simultaneously perform consensus operations to execute block redaction or block consensus, thereby improving consensus efficiency. Moreover, the consensus committees hold key information, preventing the misuse of redaction rights. A system master key generation algorithm, a user sub-key generation algorithm, and a key update algorithm are designed. A chameleon hash algorithm with updatable sub-keys is proposed, enabling the system master key to revoke a user’s redaction rights by updating their sub-key. Additionally, a dual-hash function scheme is constructed, wherein standard hash values generated by a conventional hash function are used for redaction transactions, while a chameleon hash function with updatable sub-keys is applied to generate hash values for non-redaction transactions. A block redaction strategy is designed, which is divided into four phases: initialization, block generation, block redaction, and key update. The execution process of nine algorithms is developed, including the redaction request generation algorithm, collision algorithm, key update algorithm, and others.
2. Related Work
In recent years, redactable blockchain has become an emerging research hotspot. Immutability is regarded as the irreplaceable cornerstone of blockchain technology [21]. However, in practical applications, alliance chain technology has been found to have urgent data redaction needs in areas such as information supervision, privacy protection, data updates, and scalability. To enable the effective redaction of block data, scholars have conducted extensive research. Ateniese et al. [22] proposed the first redactable solution to modify and delete data on the chain. This solution uses the Chameleon hash function, which allows for the determination of valid hash collisions through secret trapdoor information, thereby enabling information redaction. Huang et al. [23] studied a redaction scheme based on time-updatable Chameleon Hash (TUCH) and linkable and redactable ring signature (LRRS) algorithms. This scheme supports anonymous redaction with low modification costs. Pang Jun et al. [24] proposed a redactable blockchain model that reconstructs the underlying structure of the blockchain and adds a temporal-based index to achieve logical blockchain redaction by appending transactions. These schemes, using Chameleon hashes and temporal indexes, achieve effective redaction of block data but overlook the risks of abuse due to the centralization of redaction rights.
To ensure the legality and effectiveness of blockchain redaction, scholars have designed decentralized solutions. Lv Weilang et al. [25] designed a redactable scheme suitable for alliance chain. In this scheme, the trapdoors produced by the Chameleon hash algorithm are managed by multiple nodes, so the solution does not affect the integrity verification of the blockchain and enables multi-party consensus modification of transaction data. Wu et al. [26] addressed the issue of Chameleon Hash functions being vulnerable to quantum attacks by proposing a lattice-based single-trapdoor key-hiding Chameleon Hash function, both with and without lattice trapdoors. In the case without a trapdoor, this solution uses a fully distributed key management mechanism to avoid abuse of redaction rights and implements block redaction using the universal framework of Ateniese et al. [22]. In the case of a trapdoor, the scheme adopts a voting strategy to limit redaction rights. Ma et al. [27] proposed a fine-grained, distributed redactable blockchain. This scheme uses a decentralized policy-based Chameleon Hash (DPCH), where redaction rights are controlled by multiple authoritative agencies, avoiding security issues caused by centralization. Jia et al. [28] proposed an efficient redactable blockchain with traceability in a decentralized environment. This scheme uses a decentralized Chameleon Hash function, requiring that each redaction be approved by multiple blockchain nodes. All block redacts are stored on the block, and the redaction block is encoded into an RSA accumulator [29]. Additionally, the scheme designs a block consistency check protocol based on the RSA accumulator. Li et al. [30] proposed a redactable blockchain model using a non-interactive Chameleon Hash (NITCH), supporting the dynamic distribution of partial trapdoor keys. Users who hold a certain share of the trapdoor keys can obtain valid hash collisions.
To limit malicious user redaction behavior, some scholars have designed accountable or punishable solutions. Tian et al. [31] designed a policy-based Chameleon Hash algorithm with black-box accountability (PCHBA). Black-box accountability allows authoritative agencies to link modified transactions to the responsible party in case of disputes. All users can interact with the black-box and query the modifying party. Jia et al. [32] re-examined the conflict between blockchain immutability and redaction and proposed a fine-grained redactable blockchain with a semi-trusted regulator. This scheme supports content supervision on the blockchain and allows users to manage their own data. Ren Yanli et al. [33] proposed a fair redactable blockchain solution, which allows users to supervise redactors and set corresponding punishment mechanisms for malicious behavior, ensuring the fairness of redaction rights (Table 1).
This paper implements the redaction capability of the alliance chain using dual hash functions, and ensures accountability of the redaction process through a subkey-updatable hash function. Additionally, a consensus group division method is employed to achieve a multi-center redactable alliance chain, with redaction reviews conducted through a redaction center.
3. Redactable Model
3.1. Architecture
This redactable model is composed of user nodes, consensus nodes, the redaction center, and the consensus committee, as shown in Figure 1.
User Node: This entity represents a user of the system, participating in the initiation and verification of various transactions. Transactions initiated by user nodes are primarily categorized into two types: redaction transactions and non-redaction transactions. The redaction transaction requires prior review by the redaction center before being executed by the consensus nodes, rather than being directly processed by the consensus nodes.
Consensus node: This entity acts as the executor of block operations. When a transaction involves block modification, the consensus node performs the corresponding redaction operations. Conversely, the consensus node is responsible for packaging all transactions to generate a new block.
Redaction Center: This entity serves as the reviewer for redaction requests. The Redaction Center is responsible for verifying the validity of redaction requests and assessing the reasonableness of the proposed redaction. Once approved, the Redaction Center generates the corresponding redaction transaction, signs it, and forwards it to the consensus nodes for transaction packaging and block redaction.
Consensus Committee: This entity is composed of all consensus nodes. The Consensus Committee conducts transaction consensus through a consensus algorithm to ensure block consistency across all nodes. In addition, the Consensus Committee maintains the key information of the chameleon hash functions within all blocks, including the system’s master key pair and all users’ subordinate key pairs.
3.2. Model Design
Without loss of generality, we denote sets as uppercase, handwritten, bold letters (e.g., D). The i-th row of W is denoted by Wi, and the element found in the j-th column of i-th row in W is denoted as Wij. To ease reading, we summarize the frequently used notations in Table 2.
3.2.1. Review and Consensus Mechanism
(1). Grouping method of consensus nodes
. is the set of nodes, and is the number of nodes. is the i-th node. Nodes are classified into honest nodes and malicious nodes. Honest nodes maintain the success of the consensus mechanism, while malicious nodes disrupt the consensus mechanism or alter the information within the alliance chain network.
Suppose there be features for the alliance chain nodes, and let represent the feature values of the -th node in the feature. Then, the feature set for the nodes can be represented as
(1)
Compared to other clustering algorithms, K-medoids offers flexibility in handling arbitrary distance metrics, robustness to outliers, interpretability of medoids, and suitability for mixed or complex data types. These characteristics make it an ideal choice when dealing with the diversity and irregular structure of alliance chain data, ensuring that the resulting clusters reflect meaningful and consistent node groupings while minimizing the impact of noise or outliers. Using the K-medoids algorithm to calculate the similarity between alliance chain redaction nodes, the distance function between two nodes, and , is represented by Euclidean distance, denoted as
(2)
The K-medoids algorithm clusters into clusters, denoted as . Within each cluster , the similarity among nodes is high, while their similarity to nodes in other clusters is relatively low. The objective function is calculated in Equation
(3)
where, is the medoid of the k-th cluster, and is an indicator variable. For value, if belongs to the k-th cluster, then = 1; otherwise, = 0.. Each cluster consists of nodes with similar characteristics, identified using the K-medoids algorithm. Suppose contains nodes, then can be represented as . Where, denotes the -th node in the -th agency.
(2). Methods for Constructing the Redactorial Center and Consensus Committee
Using the Euclidean distance to calculate the similarity between the node within a cluster and the center of other clusters, the formula for the objective function is
(4)
The institution of is referred to as the central institution. In other words, the central institution consists of a collection of nodes with multiple features.
. is the central institution of , meaning . is a node in , meaning . possesses the characteristics of any institution .
In the consensus process of the alliance chain, the Redaction Center does not have an independent consensus but needs to participate in the consensus of other k-1 institutions. Therefore, the Redaction Center forms a consensus group with the other institutions, consisting of k-1 participants.
. Agency together with the Redaction Center , forms the organization , that is . Where, is a member of any group and must participate in the consensus of group .
There are honest nodes and malicious nodes in the group, with the malicious nodes disrupting the consensus. Additionally, having too many nodes in the group participating in consensus transactions can also increase the consensus time. Therefore, it is necessary to select honest nodes to participate in the consensus, forming a consensus committee.
. Honest nodes are selected from group to form the consensus committee , that is . The consensus committee is responsible for reaching consensus on both non-redaction transactions and block redaction transactions. The consensus algorithm uses the FCBFT consensus mechanism developed by the research team.
Each consensus algorithm of a consensus committee is independent and does not affect others. Therefore, the k-1 group consensus algorithms can proceed simultaneously.
3.2.2. Security Scheme of Double Hash Functions
In alliance blockchains, blocks are typically composed of a block header and a block body. The block body mainly stores transaction information and hash values. The hash functions used in these blocks are collision-resistant. Once the transaction information in a block is altered, the corresponding hash value changes as well, making it difficult to modify the block data. Therefore, this section designs a redactable block structure, as shown in Figure 2.
In the redactable block structure, hash functions are divided into two types: standard hash and subkey-updatable chameleon hash. The subkey-updatable chameleon hash function is an improvement based on the team’s research on the quantum-resistant hash algorithm HIBCH-RS, achieved through the modification of Algorithm 2, Algorithm 3, and Algorithm 8 in the redactable strategy [12]. In the leaf nodes of the block body, there are two methods for generating hash values from transaction information. One method involves transaction information that does not involve block modification, with nodes using the subkey-updatable chameleon hash function for hashing. This is because non-redactable transaction information may be modified by subsequent redaction transactions. In contrast, nodes use the standard hash function for hashing. This is because the information of redaction transactions, as records of block modification, has the characteristic of being immutable. Additionally, in all non-leaf nodes of the block body, the standard hash function is used for hashing.
This block structure allows users with chameleon hash keys to perform redaction operations on block data while ensuring hash consistency of the block. Moreover, the redaction information is stored completely and effectively within the block, ensuring that redaction records are query.
3.2.3. Redactable Strategies
To achieve redaction in blockchain, this paper employs the CHSU instead of the standard hash function. The system first generates a set of public parameters, including public parameters for two foundational chameleon hash functions. Then, the system performs key generation, which includes the system’s master key pair and subkey pairs for individual users. When a blockchain user identifies the need to redact a block, they can initiate a redaction request. Upon receiving the request, the redaction center reviews the legality of the user’s redaction and the rationality of the proposed changes. If the request is approved, the redaction center generates a redaction transaction and sends it to the consensus nodes. The consensus nodes first request the system master key from the consensus committee. They then calculate a hash collision based on the redaction transaction information and update the transaction data in the old block. New verification character combinations and other redaction information are stored as auxiliary data. Finally, the consensus nodes broadcast the redaction results, and other nodes validate these results before performing the corresponding local redaction. The information from the redaction transaction is packaged by the consensus nodes into a newly generated block, serving as a record of the redaction.
Overall, the model’s workflow is divided into four stages: initialization, block generation, block redaction, and key updating, as shown in Figure 3.
(1). Initialization Phase (Algorithms 1–3)
| Algorithm 1: Initialization algorithm |
| The input is a security parameter, and the output is a public parameter. |
| Algorithm 2: The master key generation algorithm |
| The input is the public parameter. |
Both algorithms are executed only once during the initialization phase. In the output of the system master key pair, the public key is publicly accessible to all users. The private key , however, is held by the consensus committee and can only be accessed by consensus nodes during block operations.
| Algorithm 3: The subkey generation algorithm |
| The input is the public parameter. |
The subkey generation algorithm is executed once for each user during the initialization phase. In the output subkey pair, the public key is publicly accessible to all users. In contrast, the private key is held by the user and is only used as an input during block editing operations.
(2). Block Generation Phase (Algorithms 4 and 5)
| Algorithm 4: The hash algorithm |
| The inputs consist of the master public key , the sub-public key , and the message . |
Whenever a new block is generated in the system, the hash algorithm is executed by consensus nodes. The resulting hash value, verification string, and other related information are publicly accessible.
| Algorithm 5: The hash verification algorithm |
| The inputs consists of the main public key , hash value , status flag , subkey public key , verification string combination , and message . |
(3). Block Redaction Phase (Algorithms 6–8)
| Algorithm 6: The redaction request generation algorithm |
| The inputs are a message , user key , hash value , checksum combination , status flag , and new message . |
| Algorithm 7: The redaction request verification algorithm |
| The input is the redaction request. |
| Algorithm 8: The redaction algorithm |
| The inputs consists of the secret key , the hash value , the checksum combination , the message , the subkey public key , and the new message . |
(4). Key Update Phase (Algorithm 9)
| Algorithm 9: The key update algorithm |
| The inputs consist of the master key , hash value , checksum combination , message , user public key , and status flag , with and . |
Note that the key update algorithm does not directly replace the original user key pair with a new one. Instead, the algorithm updates the keys specifically for the hash value , the verification string , and the message . The new private key is held by the system, while the user retains the original private key . Consequently, the user can no longer use to redact the message.
4. Experiments and Discussion
4.1. Safety Analysis
Explaining the security of RBAU through the following properties and proofs.
Definition (Secure RBAU): If RBAU satisfies correctness, key collision resistance, subkey updatability, and master key non-updatability, it is secure.
Property: If the chameleon hash functions and are secure, then RBAU is also secure.
Explanation: Since RBAU is constructed from two secure chameleon hash functions and , their enhanced collision resistance and correctness ensure the security of the RBAU.
Furthermore, the correctness, original key collision resistance, updated key collision resistance, the subkey updatability, and the non-updatability of the master key of RBAU are demonstrated as follows.
4.1.1. Correctness
The correctness requirement in RBAU is that all hash and checksum string combinations correctly generated by , , and must pass the check by . The experiment defines correctness, and the specific process is shown in Figure 4. Formally, if all adversaries believe , then RBAU is correct.
In the correctness experiment, variables such as the user’s private key , user’s public key , message hash , and state can be modified by the oracle or . The adversary can obtain the modified by . Within polynomial time , A can freely make collision queries and update queries by or , respectively. Once all queries are completed, will set the flag signal to . Then, will check the validity of . If valid, outputs 1; otherwise, it outputs 0.
Clearly, the correctness guarantees of the two underlying Chameleon hashes ensure the correctness of RBAU.
4.1.2. Original Key Collision Resistance
The requirement for the original key’s resistance to collision is that, when the user’s key is and the master key is , an attacker without any key cannot find any collisions. Experiment defines the original key’s collision resistance, with the specific process shown in Figure 5. Formally, if all attackers believe in , then RBAU possess initial key collision resistance, where is a negligible probability.
Challenger holding the public key of can query the oracle for collision queries and request different tuples . If is valid under the public key and state , then will obtain a collision for the hash corresponding to , meaning is allowed to generate any hash value and . After completing all queries, if can produce a valid collision, outputs 1.
If is an adversary capable of breaking the original key collision resistance of RBAU, then we can construct another adversary , which can break the enhanced collision resistance of the foundational chameleon hashes and by . receives the public key from challenger and the sub-public key from challenger as challenge keys, and then sends them to . can select based on and compute . Then, sends to to query the oracle .
First, calculates . If the result is 0, the call ends. If the result is 1 and = , parses = and = (, then calculates . sends to to query the collision . After validating the query, uses the key to calculate the new collision and returns it to . Finally, sends to . If the result is 1 and = , parses = and = (), then queries from , and finally, sends to .
returns to , then analyzes = and = . If the result can be validated through the verification in Figure 4, and = , can use it to break and decrypt . On the other hand, ≠ , can also use to break . Therefore, the probability that can break the original key’s collision resistance of RBAU is = , where is the probability that can break the enhanced collision resistance of , and is the probability that can break the enhanced collision resistance of , both of which can be neglected.
4.1.3. Updated Key Collision Resistance
In RBAU, can update the subkeys involved in the calculation of and output the new subkey pair . The update key collision resistance requires that, when the subpublic key is , the adversary holding the original subkey cannot find any collisions. Experiment defines the update key collision resistance, and the specific process is shown in Figure 6. Formally, if all adversaries A consider , then RBAU has updated key collision resistance.
An adversary holding the master public key can compute the tuple using a user’s subkey pair . Then, can call the oracle to obtain a new sub-public key . Afterward, with the subkey pair , can still call to compute a valid collision for . However, the message cannot be queried. The experiment will maintain the hash state value of . After some time, if can find a valid collision for with the new subkey pair , then outputs 1.
Opponent receives public key and sub-public key as challenge keys from challengers and , respectively, then sends to . selects based on and computes . Then sends to , calling the oracle .
After receiving the tuple , checks its correctness. If correct, selects as the new sub-public key, parses = and = (, and then calculates . sends to challenger to find a collision. Then, sets the state of to . After validating the query, challenger finds the collision using and returns to . Finally, sends to .
can select any and query . can query to get to simulate . can query multiple times within polynomial time . A returns to , and parses = . If the result is validated through the verification in Figure 5, it means is the message of . If = , can use to break . Conversely, can use to break . Therefore, the possibility that can break the update key collision resistance of RBAU is = . Similarly, both can be neglected.
4.1.4. The Subkey Updatability
The holder of the master key can limit the collision of a specific hash value by updating the sub-key pair . The requirement for sub-key updateability is that once the sub-key pair related to the hash value is updated, its holder will no longer be able to compute any collisions for hash value . Experiment defines key updatability, and the specific process is shown in Figure 7. Formally, if all adversaries believe in , RBAU is sub-key updatable. It is worth noting that although the updated user key cannot compute a valid collision for , it can still compute collisions for other hash values.
In the experiment, adversary holds the public key and selects a user sub-key pair . Then, using and , they compute the tuple . will call the oracle and obtain a new sub-key pair , where represents the original sub-public key . Experiment will maintain the state st of the hash value . Then, uses the new sub-key pair and calls the oracle to obtain a valid collision for . The message can be queried. After some time, if can find a valid collision for the original sub-key pair with respect to , then outputs 1.
In RBAU, the injective function is set as the identity mapping. Therefore, the probability of sub-key updatability being compromised is equivalent to the probability that two key pairs randomly generated from are the same. However, this probability is negligible. Thus, RBAU is sub-key updatable.
4.1.5. The Non-Updatability of the Master Key
The requirement for the non-updatability of the master key is that an adversary , who does not have the master key , cannot update the user key pair sp. It is formally defined by experiment , as shown in Figure 8. Formally, if all adversaries believe in , then RBAU has master key non-updatability.
In the experiment, an adversary holding the public key can query the oracle . can select a user key pair and compute a tuple . Then, selects a new message and queries the oracle for . returns a new verification string , a new user public key , and a new state to . can repeat the above process with different inputs within polynomial time . does not require the maintenance of state, as it allows to generate arbitrary hash values as well as two state values and . After the query, if can perform a new update related to the selected tuple , outputs 1.
Adversary receives as the challenge key from challenger and sends it to . can select and based on and compute , then send to for querying the oracle . After receiving , checks its correctness. If correct, first parses = and = (. Then, randomly selects a new sub-key pair and computes . sends to challenger to find a collision. After validating the query, challenger will use to find the collision and return to . Finally, sends back to .
A returns to . parses = and = . If the result can be validated through Figure 7, can use hh to break . Therefore, the possibility that can break RBAU’s master key non-updatability is equal to the possibility that B can break the enhanced collision resistance of , which can be considered negligible.
4.2. Experimental Results and Analysis
4.2.1. Experimental Environment
This experiment implements the Chameleon Hash algorithm based on Java 17.0.3 and uses the Type A prime-order elliptic curve from the JPBC 2.0.0 library to perform related bilinear pairings. The default public key length for the algorithm is 1024 bits, and the default private key length is 80 bits. To build a simulation environment for the FISCO BCOS alliance chain, this experiment installs several basic tools on an Ubuntu system, including OpenSSL, cURL, Git, Java, Solidity, and build_chain.sh. Among these, OpenSSL and cURL are dependencies for automated scripts when deploying nodes. Git is used as a version control tool for code development and testing. Java is used to call interfaces and serves as a tool for operations on the alliance chain. Solidity is used to implement specific business logic and develop smart contracts. build_chain.sh is a script tool for quickly setting up the blockchain. The device information for this experiment is shown in Table 3.
4.2.2. Function Comparison
We compared our method with the literature [24,25,31,32,33] in terms of features such as technology, redaction type, decentralization degree, redaction review, personal data management, accountability, and key updatability, as shown in Table 4.
Clearly, this method is more comprehensive in its functionality. It supports redaction review, personal data management and redaction accountability. Moreover, it implements physical redaction and is multi-center. Additionally, it can revoke the redaction rights of malicious users through the update of sub-keys.
4.2.3. Algorithm Performance
To test the performance of this method, simulation experiments were conducted to evaluate the overhead of the sub-algorithms, and the results are shown in Figure 9. In the initialization phase, the execution time of the initialization algorithm (Setup) is negligible, while the execution time of the key generation algorithm (KeyGen) is 13 ms. In the block generation phase, the execution times of the hash generation algorithm (Hash) and the hash verification algorithm (Verify) are 45 ms each. In the block redaction phase, the execution time of the redaction request generation algorithm (RedactReq) is negligible, while the overhead of the redaction request verification algorithm (Redaction Ver) and the redaction algorithm (Adapt) is 55 ms and 23 ms, respectively. In the key update phase, the execution time of the key update algorithm (Update) is 59 ms. Note that the bit lengths of the system key pair and the user key pair are the same, and their generation overhead is roughly the same. In the figure, “Keygen” represents the generation overhead for both. Additionally, the time overhead of the redaction request verification algorithm is unstable and depends on the content of the redaction.
Clearly, the execution time of the Update algorithm is the longest. This is because its computation includes the full operations of the Keygen and Adapt algorithms, as well as part of the Hash algorithm. However, the Update algorithm is only executed when a malicious user is revoked from redaction a specific hash. Therefore, the actual execution frequency of the Update algorithm will be much lower than that of the other sub-algorithms. In conclusion, the execution times of the sub-algorithms in RBAU are acceptable.
The key length is a critical factor determining the security of the Chameleon Hash function. However, increasing the key length also increases the computational overhead and results in longer execution times. To balance algorithm efficiency and security, we tested the performance of each subalgorithm at key lengths of 80 bits, 160 bits, and 256 bits, with the results shown in Figure 9.
From Figure 10, it is evident that the execution time of each subalgorithm exhibits a linear relationship with the key length. Compared to the other two key lengths, the execution time is the longest when the key length is 256 bits. Specifically, the execution time of the Hash algorithm is approximately 137 ms, the Verify algorithm takes around 136 ms, and the Update algorithm has the longest execution time, about 177 ms. At the three key lengths tested, the execution times of the RBAU subalgorithms are all under 200 ms, which can generally meet the needs of food traceability scenarios.
4.2.4. Model Performance
To test the performance of the RBAU, the experiment compared it with the FISCO BCOS, which are networks that were set up. In both cases, the number of nodes was set to 100, with a consensus committee of five nodes.
(1). Execution Time of the Transaction
The experiment tested the execution time of transactions on two blockchains, with the results shown in Figure 11. It can be observed from (a) that the execution time for the RBAU is slightly longer than that of FISCO. As shown in (b), when there are two transactions, the time difference between the two blockchains is smallest, about 0.04 s. However, when there are 18 transactions, the time difference is largest, around 0.08 s. The difference in execution time is mainly due to the RBAU using the Chameleon hash function instead of the standard hash function. The Chameleon hash function is more complex to compute, leading to a longer execution time. However, the time difference does not increase further as the number of transactions increases, remaining stable between 0.04 and 0.08 s. As shown in (c,d), the rate of change in execution time relative to transaction volume is concentrated between 0.04 and 0.05 s, with RBAU showing a more stable performance than FISCO.
(2). Block Size of Transactions
The block size is one of the main indicators of the performance of alliance chains. To investigate this, an experiment was conducted comparing the block sizes of two blockchains with an equal number of transactions, as shown in Figure 12. It can be observed from (a) that the block size of both chains has a linear relationship with the number of transactions contained in the block. When the block contains 100 transactions, the RBAU has a block size of 102.4 KB, while FISCO’s block size is 81.9 KB. Clearly, the block size of the RBAU is slightly larger than that of FISCO. This difference is mainly due to the additional fields, such as extra data, added to the block structure in the RBAU. These fields increase the storage space required for each block. However, adding these extra elements is necessary to ensure that all redactions are recorded and can be held accountable. Moreover, as shown in (b), when each block contains 100 transactions, the block size difference between the two chains is only 20.48 KB.
(3). Execution Time of Redaction
The execution time of redaction transactions and ordinary transactions in the RBAU was tested, and the results are shown in Figure 13. It can be observed from (a) that the execution time of redaction transactions is significantly longer than that of ordinary transactions. The execution time for two redaction transactions is approximately 0.41 s, while that for two ordinary transactions is about 0.22 s. As shown in (b), the average execution time difference per transaction between the two types is around 0.095 s at this stage. When each type of transaction is executed 20 times, the average execution time difference per transaction is approximately 0.026 s. Evidently, as the number of transactions increases, the execution time gap per transaction does not expand but rather decreases further. As shown in (c,d), the variation rate of redaction transaction time with transaction volume falls within the range of 0.03–0.09 s, and the stability of the variation rate for both types of transactions remains relatively consistent.
In summary, RBAU is comparable to FISCO in terms of transaction execution time, block size, and redaction execution time, with both demonstrating similar performance.
5. Conclusions
The alliance chain, with its characteristics of decentralization, immutability, and high transparency, has become a crucial supporting technology for driving digital transformation. However, as the application scenarios of alliance chain technology become increasingly complex, its core feature of immutability has gradually revealed limitations in practical use. To address this issue, RBAU introduces functionalities for data modification, deletion, and updating while maintaining the decentralization and high security of alliance chain technology. This provides an innovative solution to the shortcomings of flexibility and privacy protection in alliance chains. Therefore, this paper conducts an in-depth study on alliance chain redaction review and consensus mechanisms, hash function security schemes, and redaction strategies, proposing new methods for redactable blockchains.
A redaction review and consensus mechanism for alliance chain is proposed. The K-medoids clustering algorithm is used to select the redaction center and multiple consensus committees. The redaction center utilizes a redaction request verification algorithm to conduct redaction reviews, while the consensus committees are grouped to perform block redaction and block consensus.
A chameleon hash algorithm with updatable subkeys is proposed. The system master key enables the revocation of a user’s redaction rights by updating their subkey. Based on this, a dual-hash function scheme is implemented, enabling the chameleon hash function to work in coordination with standard hash functions.
A redaction strategy is proposed to realize an RBAU model that supports redaction review, redaction accountability, personal data management, and subkey updates. Security analysis demonstrates the model’s security, and experimental results indicate that the performance of the RBAU is comparable to that of the FISCO alliance chain.
This model is capable of meeting the current demands of the alliance chain scenario, but as the number of nodes continues to grow on a large scale, the redaction efficiency will decrease. In the future, we will introduce reinforcement learning to optimize the consensus mechanism of the alliance chain. By adjusting the consensus participation weights and reward mechanisms based on the nodes’ response times, contributions, and other performance metrics, we aim to further improve redaction efficiency.
Conceptualization, T.G. and Y.C.; methodology, Y.C.; software, Y.C., X.C. and Q.R.; validation, T.G., Y.C. and X.Y.; formal analysis, T.G. and F.Z.; investigation, T.G. and F.Z.; resources, Y.C. and S.L.; data curation, T.G. and Y.C.; writing—original draft preparation, Y.C.; writing—review and editing, T.G. and F.Z.; visualization, T.G. and X.C.; supervision, Y.C.; project administration, T.G.; funding acquisition, Y.C. and S.L. All authors have read and agreed to the published version of the manuscript.
Data are contained within the article.
This working was supported by “The provincial-level application-oriented characteristic discipline of Business Administration at Hunan Women’s University”, “The provincial-level application-oriented characteristic discipline of Sociology at Hunan Women’s University”.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 1 Model architecture of redactable blockchain.
Figure 2 Redactable block structure. H is a standard hash function, CH is a chameleon hash function that is updatable by subkeys.
Figure 3 Model’s workflow.
Figure 4 The experiment for correctness.
Figure 5 The experiment for original key collision resistance.
Figure 6 The experiment for updated key collision resistance.
Figure 7 The experiment for subkey updatability.
Figure 8 The experiment for the non-updatability of the master key.
Figure 9 Sub-algorithm execution time.
Figure 10 Sub-algorithm execution time under different key lengths.
Figure 11 Blockchain transaction execution time. (a) Time overhead, (b) the differences in time overhead, (c) rate of change, (d) the range of the rate of change.
Figure 12 Block size of transactions. (a) Block size, (b) the difference between the blocks.
Figure 13 Execution time of redaction. (a) Time overhead, (b) the differences in time overhead, (c) rate of change, (d) the range of the rate of change.
Comparison of literature.
| Literature | Redaction Function | Redaction Mode | Degree of Decentralization | Redaction Review |
|---|---|---|---|---|
| [ | Chameleon hash | Physics | Centralization | Uncensorable |
| [ | Chameleon hash | Physics | Centralization | Uncensorable |
| [ | Timing index | Logic | Centralization | Uncensorable |
| [ | Chameleon hash | Physics | Multicenter | Uncensorable |
| [ | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
| [ | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
| [ | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
| [ | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
| [ | Chameleon hash | Physics | Semi-decentralized | Uncensorable |
| [ | Chameleon hash | Physics | Semi-decentralized | Review |
| [ | Chameleon hash | Physics | Semi-decentralized | Review |
Summary of the main symbols.
| Notation | Definition | Notation | Definition | Notation | Definition |
|---|---|---|---|---|---|
| | node | | Hash value | | Data public key |
| | cluster | | Common parameter | | message |
| | Agency | | Private key | | Check string |
| | Redaction Center | | System private key | | Status flag |
| | Organization | | Data private key | | Test value |
| | Consensus Committee | | Public key | | Redact request |
| | Chameleon hash algorithmd | | System public key |
Environment of the experiment platform.
| Configuration | Server | Computer |
|---|---|---|
| Memory | 128 G | 32 G |
| CPU | Intel Xeon Silver 4210(2) (Intel, Santa Clara, CA, USA) | i7-12700 |
| Graphics card | RTX4090 | RTX3070 |
| Hard disk | 6TSSD | 1TSSD + 1THDD |
| OS | Ubuntu20.04/Win10 | Ubuntu20.04 |
| Bandwidth | 300 M | 300 M |
Comparison with advanced models.
| Models | Blockchain-Based | Redaction Function | Redaction Mode | Degree of Decentralization | Redaction Review | Personal Data Management | Account- | Key Update |
|---|---|---|---|---|---|---|---|---|
| Literature24 | Alliance chain | Timing index | Logic | Multicenter | N | N | Y | N |
| Literature25 | Alliance chain | Chameleon hash | Physics | Multicenter | N | N | Y | N |
| Literature31 | Public chain | Chameleon hash | Physics | Semi-decentralized | N | N | Y | N |
| Literature32 | Public chain | Chameleon hash | Physics | Semi-decentralized | Y | Y | Y | Y |
| Literature33 | Public chain | Chameleon hash | Physics | Semi-decentralized | Y | N | Y | Y |
| Ours | Alliance chain | Chameleon hash | Physics | Multicenter | Y | Y | Y | Y |
1. Kouhizadeh, M.; Saberi, S.; Sarkis, J. Blockchain technology and the sustainable supply chain: Theoretically exploring adoption barriers. Int. J. Prod. Econ.; 2021; 231, 107831. [DOI: https://dx.doi.org/10.1016/j.ijpe.2020.107831]
2. Sanka, A.I.; Cheung, R.C.C. A systematic review of blockchain scalability: Issues, solutions, analysis and future research. J. Netw. Comput. Appl.; 2021; 195, 103232. [DOI: https://dx.doi.org/10.1016/j.jnca.2021.103232]
3. Jiang, Y.; Xu, X.L.; Gao, H.H.; Rajab, A.D.; Xiao, F.; Wang, X.H. LBlockchainE: A Lightweight Blockchain for Edge IoT-Enabled Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst.; 2023; 24, pp. 2307-2321. [DOI: https://dx.doi.org/10.1109/TITS.2022.3157447]
4. Andola, N.; Raghav,; Yadav, V.K.; Venkatesan, S.; Verma, S. Anonymity on blockchain based e-cash protocols-A survey. Comput. Sci. Rev.; 2021; 40, 100394. [DOI: https://dx.doi.org/10.1016/j.cosrev.2021.100394]
5. Zhou, S.S.; Li, K.C.; Xiao, L.J.; Cai, J.H.; Liang, W.; Castiglione, A. A Systematic Review of Consensus Mechanisms in Blockchain. Mathematics; 2023; 11, 2248. [DOI: https://dx.doi.org/10.3390/math11102248]
6. Zhang, T.; Huang, Z.G. Blockchain and central bank digital currency. Ict Express; 2022; 8, pp. 264-270. [DOI: https://dx.doi.org/10.1016/j.icte.2021.09.014]
7. Chinnasamy, P.; Babu, G.C.; Ayyasamy, R.K.; Amutha, S.; Sinha, K.; Balaram, A. Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques. Sensors; 2024; 24, 6143. [DOI: https://dx.doi.org/10.3390/s24186143]
8. Soltanisehat, L.; Alizadeh, R.; Hao, H.J.; Choo, K.K.R. Technical, Temporal, and Spatial Research Challenges and Opportunities in Blockchain-Based Healthcare: A Systematic Literature Review. IEEE Trans. Eng. Manag.; 2023; 70, pp. 353-368. [DOI: https://dx.doi.org/10.1109/TEM.2020.3013507]
9. Chinnasamy, P.; Ayyasamy, R.K.; Tiwari, V.; Dhanasekaran, S.; Santhosh Kumar, B.; Sivaprakasam, T. Blockchain Enabled Privacy-Preserved Supply-Chain Management for Tracing the Food Goods. Proceedings of the 2024 International Conference on Science Technology Engineering and Management (ICSTEM); Coimbatore, India, 26–27 April 2024.
10. Cao, B.; Wang, Z.X.; Zhang, L.; Feng, D.Q.; Peng, M.G.; Zhang, L.; Han, Z. Blockchain Systems, Technologies, and Applications: A Methodology Perspective. IEEE Commun. Surv. Tutor.; 2023; 25, pp. 353-385. [DOI: https://dx.doi.org/10.1109/COMST.2022.3204702]
11. Ressi, D.; Romanello, R.; Piazza, C.; Rossi, S. AI-enhanced blockchain technology: A review of advancements and opportunities. J. Netw. Comput. Appl.; 2024; 225, 103858. [DOI: https://dx.doi.org/10.1016/j.jnca.2024.103858]
12. Wang, X.Y.; Chen, Y.N.; Zhu, X.H.; Li, C.; Fang, K. A Redactable Blockchain Scheme Supporting Quantum-Resistance and Trapdoor Updates. Appl. Sci.; 2024; 14, 832. [DOI: https://dx.doi.org/10.3390/app14020832]
13. Hu, J.W.; Huang, K.Q.; Bian, G.Q.; Cui, Y.P. Redact4Trace: A solution for auditing the data and tracing the users in the redactable blockchain. Comput. Netw.; 2024; 245, 110360. [DOI: https://dx.doi.org/10.1016/j.comnet.2024.110360]
14. Sun, J.X.; Zhao, R.; Yin, H.R.; Cai, W. Incentive Mechanism for Redactable Blockchain Governance: An Evolutionary Game Approach. IEEE Trans. Comput. Soc. Syst.; 2024; 11, pp. 6953-6965. [DOI: https://dx.doi.org/10.1109/TCSS.2024.3398044]
15. Huang, K.; Zhang, X.S.; Mu, Y.; Rezaeibagha, F.; Du, X.J.; Guizani, N. Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Inform.; 2020; 16, pp. 2677-2686. [DOI: https://dx.doi.org/10.1109/TII.2019.2943331]
16. Ye, T.; Luo, M.; Yang, Y.; Choo, K.K.R.; He, D.B. A Survey on Redactable Blockchain: Challenges and Opportunities. IEEE Trans. Netw. Sci. Eng.; 2023; 10, pp. 1669-1683. [DOI: https://dx.doi.org/10.1109/TNSE.2022.3233448]
17. Wei, J.N.; Zhu, Q.H.; Li, Q.M.; Nie, L.S.; Shen, Z.Y.; Choo, K.K.R.; Yu, K.P. A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things. IEEE Internet Things J.; 2022; 9, pp. 17901-17911. [DOI: https://dx.doi.org/10.1109/JIOT.2022.3162499]
18. Yang, Y.X.; Chen, Y.L.; Liu, Z.Q.; Tan, C.Y. Verifiable and Redactable Blockchain for Internet of Vehicles Data Sharing. IEEE Internet Things J.; 2025; 12, pp. 4249-4261. [DOI: https://dx.doi.org/10.1109/JIOT.2024.3483809]
19. Yang, S.X.; Li, S.W.; Chen, W.J.; Zhao, Y.W. A Redactable Blockchain-Based Data Management Scheme for Agricultural Product Traceability. Sensors; 2024; 24, 1667. [DOI: https://dx.doi.org/10.3390/s24051667]
20. Zhang, T.S.; Zhang, L.Y.; Wu, Q.; Mu, Y.; Rezaeibagha, F. Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records. IEEE Syst. J.; 2023; 17, pp. 1962-1973. [DOI: https://dx.doi.org/10.1109/JSYST.2022.3186145]
21. Yuan, Y.; Wang, F.Y. Editable Blockchain: Models, Techniques and Methods. Acta Autom. Sin.; 2020; 46, pp. 831-846.
22. Ateniese, G.; Magri, B.; Venturi, D. Redactable blockchain–or–rewriting history in bitcoin and friends. Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P); Paris, France, 26–28 April 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 111-126.
23. Huang, K.; Zhang, X.; Mu, Y.; Rezaeibagha, F.; Du, X. Scalable and redactable blockchain with update and anonymity. Inf. Sci.; 2021; 546, pp. 25-41. [DOI: https://dx.doi.org/10.1016/j.ins.2020.07.016]
24. Peng, J.; Liu, C.; Hao, K.; Yu, M.H.; Xing, J.C.; Jiang, C.Y. Research on Editable Blockchain Model Based on Temporal Index. J. Front. Comput. Sci. Technol.; 2023; 17, pp. 1180-1188.
25. Lv, W.L.; Wei, S.J.; Yu, M.H.; Li, S.S. Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium. Chin. J. Comput.; 2021; 44, pp. 2016-2032.
26. Wu, C.; Ke, L.; Du, Y. Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain. Inf. Sci.; 2021; 548, pp. 438-449. [DOI: https://dx.doi.org/10.1016/j.ins.2020.10.008]
27. Ma, J.; Xu, S.; Ning, J. Redactable blockchain in decentralized setting. IEEE Trans. Inf. Forensics Secur.; 2022; 17, pp. 1227-1242. [DOI: https://dx.doi.org/10.1109/TIFS.2022.3156808]
28. Jia, M.; Chen, J.; He, K. Redactable Blockchain From Decentralized Chameleon Hash Functions. IEEE Trans. Inf. Forensics Secur.; 2022; 17, pp. 2771-2783. [DOI: https://dx.doi.org/10.1109/TIFS.2022.3192716]
29. Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM; 1978; 21, pp. 120-126. [DOI: https://dx.doi.org/10.1145/359340.359342]
30. Li, J.; Ma, H.; Wang, J. Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain. IEEE Trans. Inf. Forensics Secur.; 2023; 18, pp. 1653-1666. [DOI: https://dx.doi.org/10.1109/TIFS.2023.3245406]
31. Tian, Y.; Li, N.; Li, Y. Policy-based chameleon hash for blockchain rewriting with black-box accountability. Proceedings of the Annual Computer Security Applications Conference; Austin, TX, USA, 7 December 2020; pp. 813-828.
32. Jia, Y.; Sun, S.F.; Zhang, Y. Redactable blockchain supporting supervision and self-management. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security; Hong Kong, China, 4 June 2021; pp. 844-858.
33. Ren, Y.L.; Zhai, M.J.; Hu, M.Q. Fair redactable blockchain supporting malicious punishment. J. Xidian Univ.; 2023; 50, pp. 203-212.
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.