Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427247
|View full text |Cite
|
Sign up to set email alerts
|

Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 44 publications
(19 citation statements)
references
References 34 publications
0
19
0
Order By: Relevance
“…The detailed theorem and proof are shown in Appendix A. We also present an Extended Decisional Diffie-Hellman Assumption [52], which is used to prove the ciphertext anonymity of the proposed ABET scheme.…”
Section: Complexity Assumptionsmentioning
confidence: 99%
See 3 more Smart Citations
“…The detailed theorem and proof are shown in Appendix A. We also present an Extended Decisional Diffie-Hellman Assumption [52], which is used to prove the ciphertext anonymity of the proposed ABET scheme.…”
Section: Complexity Assumptionsmentioning
confidence: 99%
“…In particular, HIBE has one master secret key, which can be shared with KP-ABE. The ABET has been studied in [35,36,43,52]. Their schemes are based on cipher-policy ABE.…”
Section: Instantiation 51 the Proposed Abet Schemementioning
confidence: 99%
See 2 more Smart Citations
“…Type two is a fine-grained transactionlevel (Tx-level) edit operation designed to modify a specific transaction, more aligned with realistic requirements. The PCHBA scheme [6] links the modified transactions to the responsible modifier and does not impose a privilege penalty on the modifier who abuses rewriting privilege. It does not prevent the irresponsible modifier from abusing the privilege again the next time they edit.…”
Section: Introductionmentioning
confidence: 99%