A comprehensive survey of blockchain: From theory to IoT applications and beyond

M Wu, K Wang, X Cai, S Guo, M Guo… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
As an innovated and revolutionized technology, blockchain has been applied in many fields,
such as cryptocurrency, food traceability, identity management, or even market prediction …

Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

A quantitative analysis of the impact of arbitrary blockchain content on bitcoin

R Matzutt, J Hiller, M Henze, JH Ziegeldorf… - … Cryptography and Data …, 2018 - Springer
Blockchains primarily enable credible accounting of digital events, eg, money transfers in
cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably …

Redactable blockchain in the permissionless setting

D Deuber, B Magri… - 2019 IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Bitcoin is an immutable permissionless blockchain system that has been extensively used
as a public bulletin board by many different applications that heavily relies on its …

Policy-based chameleon hash for blockchain rewriting with black-box accountability

Y Tian, N Li, Y Li, P Szalachowski, J Zhou - Proceedings of the 36th …, 2020 - dl.acm.org
Policy-based chameleon hash is a useful primitive for blockchain rewriting. It allows a party
to create a transaction associated with an access policy, while another party who possesses …

Wolverine: A scalable and transaction-consistent redactable permissionless blockchain

J Li, H Ma, J Wang, Z Song, W Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The immutability of blockchains is critical for cryptocurrencies, but an imperative need arises
for the redaction of on-chain data due to privacy-protecting laws like GPDR. Recently …

Thwarting unwanted blockchain content insertion

R Matzutt, M Henze, JH Ziegeldorf… - 2018 IEEE …, 2018 - ieeexplore.ieee.org
Since the introduction of Bitcoin in 2008, blockchain systems have seen an enormous
increase in adoption. By providing a persistent, distributed, and append-only ledger …

Revocable policy-based chameleon hash

S Xu, J Ning, J Ma, G Xu, J Yuan, RH Deng - … Security–ESORICS 2021 …, 2021 - Springer
Policy-based chameleon hash (PCH) is a cryptographic building block which finds
increasing practical applications. Given a message and an access policy, for any chameleon …

Blockchain-based decentralized content trust for docker images

Q Xu, C Jin, MFBM Rasid, B Veeravalli… - Multimedia Tools and …, 2018 - Springer
It is feasible to deploy Docker containers in IoT (Internet of Things) devices because their
runtime overhead is almost zero. Default Docker installation does not verify an image …

Coinprune: Shrinking bitcoin's blockchain retrospectively

R Matzutt, B Kalde, J Pennekamp… - … on Network and …, 2021 - ieeexplore.ieee.org
Popular cryptocurrencies continue to face serious scalability issues due to their ever-
growing blockchains. Thus, modern blockchain designs began to prune old blocks and rely …