{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T07:43:13Z","timestamp":1776325393104,"version":"3.50.1"},"reference-count":33,"publisher":"MDPI AG","issue":"16","license":[{"start":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T00:00:00Z","timestamp":1691712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62202051"],"award-info":[{"award-number":["62202051"]}]},{"name":"National Natural Science Foundation of China","award":["62102027"],"award-info":[{"award-number":["62102027"]}]},{"name":"National Natural Science Foundation of China","award":["62172042"],"award-info":[{"award-number":["62172042"]}]},{"name":"National Natural Science Foundation of China","award":["2021M700435"],"award-info":[{"award-number":["2021M700435"]}]},{"name":"National Natural Science Foundation of China","award":["2021TQ0042"],"award-info":[{"award-number":["2021TQ0042"]}]},{"name":"National Natural Science Foundation of China","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"National Natural Science Foundation of China","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}]},{"name":"National Natural Science Foundation of China","award":["2020CXGC010116"],"award-info":[{"award-number":["2020CXGC010116"]}]},{"name":"China Postdoctoral Science Foundation","award":["62202051"],"award-info":[{"award-number":["62202051"]}]},{"name":"China Postdoctoral Science Foundation","award":["62102027"],"award-info":[{"award-number":["62102027"]}]},{"name":"China Postdoctoral Science Foundation","award":["62172042"],"award-info":[{"award-number":["62172042"]}]},{"name":"China Postdoctoral Science Foundation","award":["2021M700435"],"award-info":[{"award-number":["2021M700435"]}]},{"name":"China Postdoctoral Science Foundation","award":["2021TQ0042"],"award-info":[{"award-number":["2021TQ0042"]}]},{"name":"China Postdoctoral Science Foundation","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"China Postdoctoral Science Foundation","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}]},{"name":"China Postdoctoral Science Foundation","award":["2020CXGC010116"],"award-info":[{"award-number":["2020CXGC010116"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["62202051"],"award-info":[{"award-number":["62202051"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["62102027"],"award-info":[{"award-number":["62102027"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["62172042"],"award-info":[{"award-number":["62172042"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2021M700435"],"award-info":[{"award-number":["2021M700435"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2021TQ0042"],"award-info":[{"award-number":["2021TQ0042"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}]},{"name":"Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies","award":["2020CXGC010116"],"award-info":[{"award-number":["2020CXGC010116"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["62202051"],"award-info":[{"award-number":["62202051"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["62102027"],"award-info":[{"award-number":["62102027"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["62172042"],"award-info":[{"award-number":["62172042"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["2021M700435"],"award-info":[{"award-number":["2021M700435"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["2021TQ0042"],"award-info":[{"award-number":["2021TQ0042"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}]},{"name":"Shandong Provincial Key Research and Development Program","award":["2020CXGC010116"],"award-info":[{"award-number":["2020CXGC010116"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["62202051"],"award-info":[{"award-number":["62202051"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["62102027"],"award-info":[{"award-number":["62102027"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["62172042"],"award-info":[{"award-number":["62172042"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["2021M700435"],"award-info":[{"award-number":["2021M700435"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["2021TQ0042"],"award-info":[{"award-number":["2021TQ0042"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province","award":["2020CXGC010116"],"award-info":[{"award-number":["2020CXGC010116"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["62202051"],"award-info":[{"award-number":["62202051"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["62102027"],"award-info":[{"award-number":["62102027"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["62172042"],"award-info":[{"award-number":["62172042"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["2021M700435"],"award-info":[{"award-number":["2021M700435"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["2021TQ0042"],"award-info":[{"award-number":["2021TQ0042"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["2022B1212010005"],"award-info":[{"award-number":["2022B1212010005"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["2021CXGC010106"],"award-info":[{"award-number":["2021CXGC010106"]}]},{"name":"Beijing Institute of Technology Research Fund Program for Young Scholars","award":["2020CXGC010116"],"award-info":[{"award-number":["2020CXGC010116"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Currently, decentralized redactable blockchains have been widely applied in IoT systems for secure and controllable data management. Unfortunately, existing works ignore policy privacy (i.e., the content of users\u2019 redaction policies), causing severe privacy leakage threats to users since users\u2019 policies usually contain large amounts of private information (e.g., health conditions and geographical locations) and limiting the applications in IoT systems. To bridge this research gap, we propose PFRB, a policy-hidden fine-grained redactable blockchain in decentralized blockchain-based IoT systems. PFRB follows the decentralized settings and fine-grained chameleon hash-based redaction in existing redactable blockchains. In addition, PFRB hides users\u2019 policies during policy matching such that apart from successful policy matching, users\u2019 policy contents cannot be inferred and valid redactions cannot be executed. Some main technical challenges include determining how to hide policy contents and support policy matching. Inspired by Newton\u2019s interpolation formula-based secret sharing, PFRB converts policy contents into polynomial parameters and utilizes multi-authority attribute-based encryption to further hide these parameters. Theoretical analysis proves the correctness and security against the chosen-plaintext attack. Extensive experiments on the FISCO blockchain platform and IoT devices show that PFRB achieves competitive efficiency over current redactable blockchains.<\/jats:p>","DOI":"10.3390\/s23167105","type":"journal-article","created":{"date-parts":[[2023,8,11]],"date-time":"2023-08-11T12:10:23Z","timestamp":1691755823000},"page":"7105","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Decentralized Policy-Hidden Fine-Grained Redaction in Blockchain-Based IoT Systems"],"prefix":"10.3390","volume":"23","author":[{"given":"Hongchen","family":"Guo","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Xiaolong","family":"Tao","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9854-2697","authenticated-orcid":false,"given":"Mingyang","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Tong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China"}]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"e7602","DOI":"10.1002\/cpe.7602","article-title":"A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID-19 patients","volume":"35","author":"Chunka","year":"2023","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.33166\/AETiC.2019.03.004","article-title":"Survey on internet of things (IoT) for different industry environments","volume":"3","author":"Ahmad","year":"2019","journal-title":"Ann. Emerg. Technol. Comput. (AETiC)"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.future.2021.08.006","article-title":"Recent advancements and challenges of Internet of Things in smart agriculture: A survey","volume":"126","author":"Sinha","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TC.2022.3157996","article-title":"A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things","volume":"72","author":"Liu","year":"2022","journal-title":"IEEE Trans. Comput."},{"key":"ref_5","first-page":"1292","article-title":"Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things","volume":"19","author":"Kouicem","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"109726","DOI":"10.1016\/j.comnet.2023.109726","article-title":"A Survey on Role of Blockchain for IoT: Applications and Technical Aspects","volume":"227","author":"Mathur","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TSC.2022.3179727","article-title":"A blockchain-based cross-domain and autonomous access control scheme for internet of things","volume":"16","author":"Hao","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"109634","DOI":"10.1016\/j.comnet.2023.109634","article-title":"How can applications of blockchain and artificial intelligence improve performance of Internet of Things?\u2013A survey","volume":"224","author":"Bothra","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3343","DOI":"10.1109\/JSAC.2022.3213341","article-title":"FRUIT: A blockchain-based efficient and privacy-preserving quality-aware incentive scheme","volume":"40","author":"Zhang","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_10","unstructured":"Moonie, H. (2023, July 31). Man\u2019s \u201cRight to Be Forgotten\u201d Case Stalls After He Is Found on the Bitcoin Blockchain. Available online: https:\/\/medium.com\/@hankmoonie\/mans-right-to-beforgotten-case-stalls-after-he-is-found-on-the-bitcoin-blockchain-1a32c4fc0963."},{"key":"ref_11","first-page":"1928","article-title":"VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing","volume":"72","author":"Tian","year":"2023","journal-title":"IEEE Trans. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3787","DOI":"10.1109\/TIFS.2023.3288429","article-title":"Verifiable and Redactable Blockchains With Fully Editing Operations","volume":"18","author":"Shen","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Magri, B., Venturi, D., and Andrade, E. (2017, January 26\u201328). Redactable blockchain\u2013or\u2013rewriting history in bitcoin and friends. Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France.","DOI":"10.1109\/EuroSP.2017.37"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Deuber, D., Magri, B., and Thyagarajan, S.A.K. (2019, January 19\u201323). Redactable blockchain in the permissionless setting. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00039"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4507","DOI":"10.1109\/TIFS.2021.3107146","article-title":"K-time modifiable and epoch-based redactable blockchain","volume":"16","author":"Xu","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Derler, D., Samelin, K., Slamanig, D., and Striecks, C. (2019). Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. Cryptol. ePrint Arch.","DOI":"10.14722\/ndss.2019.23066"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2771","DOI":"10.1109\/TIFS.2022.3192716","article-title":"Redactable Blockchain From Decentralized Chameleon Hash Functions","volume":"17","author":"Jia","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1227","DOI":"10.1109\/TIFS.2022.3156808","article-title":"Redactable blockchain in decentralized setting","volume":"17","author":"Ma","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TIFS.2022.3217742","article-title":"Accountable and Fine-Grained Controllable Rewriting in Blockchains","volume":"18","author":"Xu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3569","DOI":"10.1109\/TIFS.2022.3207905","article-title":"Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing","volume":"17","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3476","DOI":"10.1109\/TIFS.2023.3283104","article-title":"Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud","volume":"18","author":"Hu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"257","DOI":"10.23919\/JCC.2022.07.020","article-title":"Achieving fuzzy matching data sharing for secure cloud-edge communication","volume":"19","author":"Zhang","year":"2022","journal-title":"China Commun."},{"key":"ref_23","unstructured":"Zhang, C., Hu, C., Wu, T., Zhu, L., and Liu, X. (2022). IEEE Transactions on Dependable and Secure Computing, IEEE. Early Access."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Tian, Y., Li, N., Li, Y., Szalachowski, P., and Zhou, J. (2020, January 7\u201311). Policy-based chameleon hash for blockchain rewriting with black-box accountability. Proceedings of the Annual Computer Security Applications Conference, Austin, TX, USA.","DOI":"10.1145\/3427228.3427247"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Panwar, G., Vishwanathan, R., and Misra, S. (2021, January 16\u201318). ReTRACe: Revocable and traceable blockchain rewrites using attribute-based cryptosystems. Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, Virtual.","DOI":"10.1145\/3450569.3463565"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Jia, Y., Sun, S.F., Zhang, Y., Liu, Z., and Gu, D. (2021, January 7\u201311). Redactable blockchain supporting supervision and self-management. Proceedings of the Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, Virtual.","DOI":"10.1145\/3433210.3453091"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Xu, S., Ning, J., Ma, J., Xu, G., Yuan, J., and Deng, R.H. (2021, January 4\u20138). Revocable policy-based chameleon hash. Proceedings of the Computer Security\u2013ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany.","DOI":"10.1007\/978-3-030-88418-5_16"},{"key":"ref_28","unstructured":"Chase, M. (2007, January 21\u201324). Multi-authority attribute based encryption. Proceedings of the Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Chae, Y., Wang, S., and Kim, S.M. (2018, January 4\u20137). Exploiting WiFi Guard Band for Safeguarded ZigBee. Proceedings of the Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys, Shenzhen, China.","DOI":"10.1145\/3274783.3274835"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Wang, S., Kim, S.M., and He, T. (2018, January 2\u20135). Symbol-Level Cross-Technology Communication via Payload Encoding. Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria.","DOI":"10.1109\/ICDCS.2018.00056"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"146:1","DOI":"10.1145\/3550322","article-title":"Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing","volume":"6","author":"Wu","year":"2022","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"4749","DOI":"10.1109\/JIOT.2020.3028574","article-title":"Integrated Multiple Kernel Learning for Device-Free Localization in Cluttered Environments Using Spatiotemporal Information","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"8528","DOI":"10.1109\/TII.2022.3218666","article-title":"Online Spatiotemporal Modeling for Robust and Lightweight Device-Free Localization in Nonstationary Environments","volume":"19","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/16\/7105\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:31:19Z","timestamp":1760128279000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/16\/7105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,11]]},"references-count":33,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2023,8]]}},"alternative-id":["s23167105"],"URL":"https:\/\/doi.org\/10.3390\/s23167105","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,11]]}}}