Redactable Blockchain - or - Rewriting History in Bitcoin and Friends

被引:288
作者
Ateniese, Giuseppe [1 ]
Magri, Bernardo [2 ,3 ]
Venturi, Daniele [3 ]
Andrade, Ewerton R. [4 ]
机构
[1] Stevens Inst Technol, Hoboken, NJ 07030 USA
[2] Friedrich Alexander Univ, Erlangen, Germany
[3] Sapienza Univ Rome, Rome, Italy
[4] Univ Sao Paulo, Sao Paulo, Brazil
来源
2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P) | 2017年
关键词
PROOFS;
D O I
10.1109/EuroSP.2017.37
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We put forward a new framework that makes it possible to re-write or compress the content of any number of blocks in decentralized services exploiting the blockchain technology. As we argue, there are several reasons to prefer an editable blockchain, spanning from the necessity to remove inappropriate content and the possibility to support applications requiring re-writable storage, to "the right to be forgotten." Our approach generically leverages so-called chameleon hash functions (Krawczyk and Rabin, NDSS '00), which allow determining hash collisions efficiently, given a secret trapdoor information. We detail how to integrate a chameleon hash function in virtually any blockchain-based technology, for both cases where the power of redacting the blockchain content is in the hands of a single trusted entity and where such a capability is distributed among several distrustful parties (as is the case with Bitcoin). We also report on a proof-of-concept implementation of a redactable blockchain, building on top of Nakamoto's Bitcoin core. The prototype only requires minimal changes to the way current client software interprets the information stored in the blockchain and to the current blockchain, block, or transaction structures. Moreover, our experiments show that the overhead imposed by a redactable blockchain is small compared to the case of an immutable one.
引用
收藏
页码:111 / 126
页数:16
相关论文
共 54 条
[31]  
Groth J, 2006, LECT NOTES COMPUT SC, V4284, P444
[32]  
Groth J, 2008, LECT NOTES COMPUT SC, V4965, P415
[33]  
Hopkins C., If You Own Bitcoin, You Also Own Links to Child Porn
[34]   Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content [J].
Kiayias, Aggelos ;
Tang, Qiang .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :231-242
[35]  
Krawczyk H., 2000, PROC NDSS, P143
[36]   How to Use Bitcoin to Play Decentralized Poker [J].
Kumaresan, Ranjit ;
Moran, Tal ;
Bentov, Iddo .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :195-206
[37]  
Manzano A. C., 2011, THESIS
[38]  
Moonie H., MANS RIGHT BE FORGOT
[39]  
Nakamoto S., 2009, BITCOIN CORE
[40]  
Naor Moni, 2001, P 33 ANN ACM S THEOR, P492, DOI DOI 10.1145/380752.380844