Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Multi-center chameleon hashing based Blockchain integrated digital copyright transaction scheme for data redacting in Blockchain based IoT systems
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 20 March 2026

Multi-center chameleon hashing based Blockchain integrated digital copyright transaction scheme for data redacting in Blockchain based IoT systems

  • Lu Chen1,
  • Aniruddha Bhattacharjya2,3,7,
  • Yuwei Sun4,5,
  • Zixuan Wang4,5,
  • Zhixin Sun4,5 &
  • …
  • Yichen Yu6 

Scientific Reports , Article number:  (2026) Cite this article

  • 778 Accesses

  • 1 Altmetric

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Traditional digital copyright protection relies on centralized authorities, which often lacks transparency and struggle to guarantee data security during ownership transfer. Furthermore, ownership changes require re-confirmation of copyrightwhich costs more time and wastes storage resources. Here a blockchain-based digital copyright transaction scheme is proposed which supports data redaction. Here multi-center chameleon hashing is used for modifying the copyright information in the transaction process. At the same time, a flexible and controllable permission node management mechanism is designed, proposed and implemented here and the optimized attribute encryption mechanism is used for providing the security protection for the node private key. The experimental results and security analysis have shown that the scheme has satisfied the data confidentiality of the copyright transferor, resistance to malicious nodes, and the confidentiality and accountability of the private key of the chameleon hash. In the scenario with more permission nodes, the private key broadcast in the node exit stage has higher efficiency and flexibility, so it’s effective in ensuring data confidentiality of the copyright transferor, resistance to malicious nodes, and the confidentiality and accountability of the private key of the chameleon hash in Blockchain based Internet of Things (BIoT) systems and it can be further used in Blockchain based Industrial Internet of Things (BIIOT) of present time.

Data availability

All data are in the paper.

References

  1. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, [Online] (2008). Available: https://bitcoin.org/bitcoin.pdf, [Accessed: Mar. 3, 2026].

  2. Monostori, L. et al. Cyber-physical systems in manufacturing. CIRP Ann. 65 (2), 621–641. https://doi.org/10.1016/j.cirp.2016.06.005 (2016).

    Google Scholar 

  3. Li, Z., Barenji, A. V. & Huang, G. Q. Toward a Blockchain cloud manufacturing system as a peer to peer distributed network platform. Robot Comput. Integr. Manuf. 54, 133–144. https://doi.org/10.1016/j.rcim.2018.05.011 (2018).

    Google Scholar 

  4. Yu, T., Lin, Z. & Tang, Q. Blockchain: The introduction and its application in financial accounting. J. Corp. Acc. Finance. 29 (4), 37–47. https://doi.org/10.1002/jcaf.22365 (2018).

    Google Scholar 

  5. Vora, J. et al. Bheem: A Blockchain-based framework for securing electronic health records. In 2018 IEEE Globecom Workshops (GC Wkshps). 1–6. https://doi.org/10.1109/GLOCOMW.2018.8644088 (2018).

  6. Sethi, A. & Sethi, S. Flexibility in manufacturing: A survey. Int. J. Flex. Manuf. Syst. 2 (4). https://doi.org/10.1007/BF00186471 (1990).

  7. Lee, J., Kao, H. A. & Yang, S. Service innovation and smart analytics for Industry 4.0 and big data environment. Procedia CIRP. 16, 3–8. https://doi.org/10.1016/j.procir.2014.02.001 (2014).

    Google Scholar 

  8. Lee, J., Bagheri, B. & Kao, H. A. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett. 3, 18–23. https://doi.org/10.1016/j.mfglet.2014.12.001 (2015).

    Google Scholar 

  9. Yang, L. Industry 4.0: A survey on technologies, applications and open research issues. J. Ind. Inf. Integr. 6, 1–10. https://doi.org/10.1016/j.jii.2017.04.005 (2017).

    Google Scholar 

  10. Xu, X. From cloud computing to cloud manufacturing. Robot Comput. Integr. Manuf. 28, 75–86. https://doi.org/10.1016/j.rcim.2011.07.002 (2012).

  11. Palma, L. M. et al. Blockchain and smart contracts for higher education registry in brazil. Int. J. Netw. Manag. 29(3), e2061. https://doi.org/10.1002/nem.2061 (2019).

  12. Zissis, D. & Lekkas, D. Addressing cloud computing security issues. Futur Gener Comput. Syst. 28 (3), 583–592. https://doi.org/10.1016/j.future.2010.12.006 (2012).

    Google Scholar 

  13. Swan, M. Rezension Blockchain: Blueprint for a New Economy. HMD 55, 1362–1364. https://doi.org/10.1365/s40702-018-00468-4 (2015).

    Google Scholar 

  14. Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. Security Challenges and Concerns of Internet of Things (IoT), In: (eds Guo, S. & Zeng, D.) Cyber-Physical Systems: Architecture, Security and Application, EAI/Springer Innovations in Communication and Computing, Springer, Cham: 153–185.

  15. Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. Secure IoT Structural design for Smart Cities, In Smart Cities Cybersecurity and Privacy, Elsevier: 187–201.

  16. Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. Present Scenarios of IoT Projects with Security Aspects Focused, In: (eds Farsi, M., Daneshkhah, A., Hosseinian-Far, A. & Jahankhani, H.) Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing), Springer, Cham: 95–122, https://doi.org/10.1007/978-3-030-18732-3_7.

  17. Bhattacharjya, A., Zhong, X., Wang, J. & Xing, L. CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAP, In: (eds Farsi, M., Daneshkhah, A. & Hosseinian-Far, A.) Jahankhani H. Digital Twin Technologies and Smart Cities. Internet of Things (Technology, Communications and Computing), Springer, Cham: 151–175, https://doi.org/10.1007/978-3-030-18732-3_9.

  18. IBM Blockchain based on Hyperledger Fabric from the Linux Foundation. [Online]. Available:. (2017). https://www.ibm.com/Blockchain/hyperledger. [Accessed: Feb. 9, 2025].

  19. Developer Hub, I. O. T. A. [Online]. (2017). Available: https://www.iota.org/research/meetthe-tangle. [Accessed: Feb. 9, 2026].

  20. Pustišek, M. & Kos, A. Approaches to Front-End IoT Application Development for the Ethereum Blockchain. Procedia Comput. Sci. vol. 129, 410–419. https://doi.org/10.1016/j.procs.2018.03.017 (2018).

    Google Scholar 

  21. Viktor Trón, F. L. & Ethereum Specification [Online]. (2015). Available: https://github.com/ethereum/go-ethereum/wiki/Ethereum-Specification. [Accessed: Feb. 9, 2025].

  22. Kim, M. et al. Blockchain-Enabled Maximum Evacuation System Using Hybrid Voting in Zero Trust Hiking Trail and Mountainous Terrain, IEEE Internet Things J., 12, 5, 5847–5858, https://doi.org/10.1109/JIOT.2024.3490560. (2025).

  23. Crosby, M. et al. Blockchain technology: Beyond bitcoin, Applied Innovation, no.2, pp.(6–10). [Online]. (2016). Available: https://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf. [Accessed: Feb. 9, 2026].

  24. Bailis, P. et al. Research for practice: cryptocurrencies, Blockchains, and smart contracts; hardware for deep learning. Commun. ACM. 60 (5), 48–51. https://doi.org/10.1145/3024928 (2017).

    Google Scholar 

  25. Aste, T., Tasca, P. & Centre, U. C. L. Blockchain technologies: The foreseeable impact on society and industry. Computer 50(9), 18–28. https://doi.org/10.1109/MC.2017.3571064 (2017).

  26. Cachin, C. & Vukoli, M. Blockchains Consensus Protocols in the Wild, arXiv preprint arXiv:1707.01873. https://doi.org/10.48550/arXiv.1707.01873 (2017).

  27. Iota. a cryptocurrency for Internet-of-Things. url: https://iota.org/.

  28. Tangle. url: https://iota.org/IOTA_Whitepaper.pdf.

  29. Bano, S. et al. Consensus in the Age of Blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 183–198. https://doi.org/10.1145/3318041.3355458 (2019).

  30. Wang, W. et al. A survey on consensus mechanisms and mining strategy management in Blockchain networks. IEEE Access. 7, 22328–22370. https://doi.org/10.1109/ACCESS.2019.2896108 (2019).

    Google Scholar 

  31. Banerjee, M., Lee, J. & Raymond Choo, K. K. A Blockchain future for internet of things security: a position paper. Digit. Commun. Networks. 4 (3), 149–160. https://doi.org/10.1016/j.dcan.2017.10.006 (2017).

    Google Scholar 

  32. Baliga, A. Understanding Blockchain Consensus Models. April, [Online]. (2017). Available: https://www.persistent.com/wp-content/uploads/2017/04/WP-Understanding-Blockchain-Consensus-Models.pdf. [Accessed: Feb. 9, 2025].

  33. Pilkington, M. Blockchain technology: principles and applications, Research handbook on digital transformations, pp. 225–253. https://doi.org/10.4337/9781784717766.00019 (2016).

  34. Sankar, L. S., Sindhu, M. & Sethumadhavan, M. Survey of consensus protocols on Blockchain applications, In 4th international conference on advanced computing and communication systems (ICACCS). IEEE, pp.1–5. https://doi.org/10.1109/ICACCS.2017.8014672 (2017).

  35. Underwood, S. Blockchain beyond bitcoin. Commun. ACM. 59 (11), 15–17. https://doi.org/10.1145/2994581 (2016).

    Google Scholar 

  36. Seibold Sigrid and Samman, George Consensus:Immutable agreement for the Internet of value, KPMG. [Online]. (2016). Available: https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmgBlockchain-consensus-mechanism.pdf. [Accessed: Feb. 9, 2026].

  37. Mukhopadhyay, U. et al. A brief survey of cryptocurrency systems, In Proceedings of the 14th annual conference on privacy, security and trust (PST). IEEE, pp. 745–752, (2016). https://doi.org/10.1109/PST.2016.7906988.

  38. Awasthi, D. et al. A comprehensive review on optimization-based image watermarking techniques for copyright protection. Expert Syst. Appl. 242 (122830). https://doi.org/10.1016/j.eswa.2023.122830 (2024).

  39. Chung, T. Y. et al. Digital watermarking for copyright protection of MPEG2 compressed video. IEEE Trans. Consum. Electron. 44 (3), pp895–901. https://doi.org/10.1109/30.713211 (1998).

    Google Scholar 

  40. Bhattacharjya, A., Zhong, X. & Wang, J. Strong, efficient and reliable personal messaging peer to peer architecture based on hybrid RSA. In Proceedings of The International Conference on Internet of Things and Cloud Computing (ICC), pp. 1–5. https://doi.org/10.1145/2896387.2896431 (2016).

  41. Bhattacharjya, A. et al. An end-to-end user two-way authenticated double encrypted messaging scheme based on hybrid RSA for the future internet architectures. International J. Inform. Comput. Security. 10, 63–79. https://doi.org/10.1504/IJICS.2018.089593 (2018).

    Google Scholar 

  42. Bhattacharjya, A. & Zhong, X. al.Hybrid RSA-based highly efficient, reliable and strong personal full mesh networked messaging scheme. Int. J. Inf. Comput. Secur. 10 (4), 418–436. https://doi.org/10.1504/IJICS.2018.095341 (2018).

    Google Scholar 

  43. Bhattacharjya, A. et al. On mapping of address and port using translation. Int. J. Inf. Comput. Secur. 11(3), 214–232. https://doi.org/10.1504/IJICS.2019.099419 (2019).

  44. Feng, L. I. U., Jie, Y. A. N. G. & Jiayin, Q. I. Survey on blockchain privacy protection techniques in cryptography. Chin. J. Netw. Inform. Secur. 8 (4), 29–44. https://doi.org/10.11959/j.issn.2096-109x.2022054 (2022).

    Google Scholar 

  45. Marinov, M., Kalmukov, Y. & Valova, I. Content-Based Image Retrieval: Impact of image resolution on the search accuracy and results ordering. In International Conference Automatics and Informatics (ICAI), 2021, pp. 72–75. https://doi.org/10.1109/ICAI52893.2021.9639858 (2021).

  46. Zhang, Q. et al. Digital image copyright protection method based on blockchain and zero trust mechanism. Multimedia Tools Appl. 83, 77267–77302. https://doi.org/10.1007/s11042-024-18514-3 (2024).

    Google Scholar 

  47. T B, R S, K B, et al. Proxy re-encryption approach to avoid illegal content sharing in cloud. In 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 2022, pp. 618–623. https://doi.org/10.1109/ICICCS53718.2022.9788263 (2022).

  48. Lee, K. et al. The Design of a DRM System Using PKI and a Licensing Agent. Netw. Parallel Comput. 611–617. https://doi.org/10.1007/978-3-540-30141-790 (2004).

  49. Tirkel, A. Z. et al. Electronic watermark. In Digital Image Computing, Technology and Applications (DICTA’93), pp. 666–673. (1993).

  50. Hemdan, E. E. D. An efficient and robust watermarking approach based on single value decompression, multilevel DWT, and wavelet fusion with scrambled medical images. Multimedia Tools Appl. 80 (2), 1749–1777. https://doi.org/10.1007/s11042-020-09769-7 (2021).

    Google Scholar 

  51. Xiang, S. J. & Yang, L. Robust and reversible image watermarking algorithm in homomorphic encrypted domain. J. Softw. 29 (4), 957–972. https://doi.org/10.13328/j.cnki.jos.005406 (2018).

    Google Scholar 

  52. Kadian, P., Arora, S. M. & Arora, N. Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey. Wireless Pers. Commun. 118 (4), 3225–3249. https://doi.org/10.1007/s11277-021-08177-w (2021).

    Google Scholar 

  53. Shen, M. et al. Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Generation Comput. Syst. 109, 621–632. https://doi.org/10.1016/j.future.2018.04.089 (2020).

    Google Scholar 

  54. Yingying, L. I., Jianfeng, M. A. & Yinbin, M. I. A. O. Encrypted image retrieval in multi-key settings based on edge computing. J. Commun. 41 (4), 14–26. https://doi.org/10.11959/j.issn.1000-436x.2020086 (2020).

    Google Scholar 

  55. Guo, J. et al. Blockchain-enabled digital rights management for multimedia resources of online education. Multimedia Tools Appl. 79, 9735–9755. https://doi.org/10.1007/s11042-019-08059-1 (2020).

    Google Scholar 

  56. Ku, W. & Chi, C. H. Survey on the technological aspects of digital rights management. In Information Security: 7th International Conference, pp. 391–403. (2004). https://doi.org/10.1007/978-3-540-30144-8_33.

  57. Subramanya, S. R. & Yi, B. K. Digital rights management. IEEE Potentials. 25 (2), 31–34. https://doi.org/10.1109/mp.2006.1649008 (2006).

    Google Scholar 

  58. Zhu, P. et al. Using blockchain technology to enhance the traceability of original achievements. IEEE Trans. Eng. Manage. 1–15. https://doi.org/10.1109/TEM.2021.3066090 (2021).

  59. Yang, Y. et al. A Video Copyright Transaction Traceability Method Based on Mother-Child Blockchain. In the 3rd International Conference on Blockchain Technology and Applications, pp. 1–6, 2021. https://doi.org/10.1145/3446983.3446984 (2020).

  60. Bachani, V., Wan, Y. & Bhattacharjya, A. Preferential DPoS: a scalable blockchain schema for high-freuency transaction. = AMCIS 2022 TREOs. 36. https://aisel.aisnet.org/treos_amcis2022/36.

  61. Gu, H., Shang, J., Wang, P., Mi, J. & Bhattacharjya, A. A secure protocol authentication method based on the strand space model for blockchain-based industrial internet of things. Symmetry-Basel 16(7), 851. https://doi.org/10.3390/sym16070851 (2024).

  62. Kumar, J. R. et al. Blockchain based traceability in computer peripherals in universities scenarios. In 3rd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS). IEEE, 2023. https://doi.org/10.1109/ICE3IS59323.2023.10335420 (2023).

  63. Si, P. et al. Distributed sender scheduling for multimedia transmission in wireless mobile peer to-peer networks. IEEE Trans. Wireless Commun. 8, 4594–4603. https://doi.org/10.1109/twc.2009.080550 (2009).

    Google Scholar 

  64. Huang, J. et al. Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism. IEEE Trans. Industr. Inf. 15, 3680–3689. https://doi.org/10.1109/TII.2019.2903342 (2019).

    Google Scholar 

  65. Zheng, Z. et al. An overview on smart contracts: Challenges, advances and platforms. Future Generation Comput. Syst. 105, 475–491. https://doi.org/10.1016/j.future.2019.12.019 (2020).

    Google Scholar 

  66. Zou, W. et al. Smart Contract Development: Challenges and Opportunities. IEEE Trans. Software Eng. 47 (10), 2084–2106. https://doi.org/10.1109/TSE.2019.2942301 (2021).

    Google Scholar 

  67. Liang, W. et al. A dual-chain digital copyright registration and transaction system based on blockchain technology. Blockchain Trustworthy Syst. 702–714. https://doi.org/10.1007/978-981-15-2777-7_57 (2021).

  68. Zhang, C. et al. A trustworthy industrial data management scheme based on redactable blockchain. J. Parallel Distrib. Comput. vol,152, 167–176. https://doi.org/10.1016/j.jpdc.2021.02.026 (2021).

    Google Scholar 

  69. Huang, K. et al. Building Redactable Consortium Blockchain for Industrial Internet-of Things. IEEE Trans. Industr. Inf. 15 (6), 3670–3679. https://doi.org/10.1109/TII.2019.2901011 (2019).

    Google Scholar 

  70. Ateniese, G. et al. Redactable Blockchain – or – Rewriting History in Bitcoin and Friends, in 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp.111–126, [Online]. (2017). Available: https://doi.org/10.1109/EuroSP.2017.37 [Accessed: Feb. 9, 2025].

  71. LI, P. L., XU H X, MA T J, MU & Y H. Research on Fault-correcting Blockchain Technology. J. Cryptologic Res. 5 (5), 501–509. https://doi.org/10.13868/j.cnki.jcr.000259 (2018).

    Google Scholar 

  72. Fan, S. & Chen, Y. Editable Blockchain Scheme Based on Shamir Chameleon Hash Secret Sharing. In IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC), vol.6, pp.1125–1128. https://doi.org/10.1109/ITOEC53115.2022.9734554 (2022).

  73. Xiaoqi, Z. H. A. O., Zhenghao, Z. H. A. N. G. & Yong, L. I. An Editable and Accountable Blockchain Scheme. J. Cyber Secur. 7 (5), 19–28. https://doi.org/10.19363/J.cnki.cn10-1380/tn.2022.09.02 (2022).

    Google Scholar 

  74. Wei-Long, L. V. et al. Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium. Chin. J. Comput. 44 (10), 2016–2032. https://doi.org/10.11897/SP.J.1016.2021.0201 (2021).

    Google Scholar 

Download references

Acknowledgements

The authors have reviewed and edited the output and take full responsibility for the content of this publication. This work was supported in part by the High-Level Research Initiation Foundation for Introduction of Talents of Nanjing Institute of Technology under Grant (YKJ202312) and the General program of philosophy and social science research in colleges and universities of Jiangsu Province (2024SJYB0333).

Funding

This work was supported in part by the High-Level Research Initiation Foundation for Introduction of Talents of Nanjing Institute of Technology under Grant (YKJ202312) and the General program of philosophy and social science research in colleges and universities of Jiangsu Province (2024SJYB0333).

Author information

Authors and Affiliations

  1. School of Communication and Artificial Intelligence, School of Integrated Circuits, Nanjing Institute of Technology, Nanjing, China

    Lu Chen

  2. Department of Electronic Engineering, Tsinghua University, Beijing, 100190, China

    Aniruddha Bhattacharjya

  3. BCBRBAB Intercontinental Trading Solutions Private Limited, New Delhi, India

    Aniruddha Bhattacharjya

  4. Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of Education, Nanjing, China

    Yuwei Sun, Zixuan Wang & Zhixin Sun

  5. Nanjing University of Posts and Telecommunications, Nanjing, China

    Yuwei Sun, Zixuan Wang & Zhixin Sun

  6. University of North Carolina at Chapel Hill, Hinton James Residence Hall, Room 613A, 515 Hinton James Drive, Chapel Hill, NC, 27514, USA

    Yichen Yu

  7. Department of Electronic Engineering, Tsinghua University, Beijing, 100190, China

    Aniruddha Bhattacharjya

Authors
  1. Lu Chen
    View author publications

    Search author on:PubMed Google Scholar

  2. Aniruddha Bhattacharjya
    View author publications

    Search author on:PubMed Google Scholar

  3. Yuwei Sun
    View author publications

    Search author on:PubMed Google Scholar

  4. Zixuan Wang
    View author publications

    Search author on:PubMed Google Scholar

  5. Zhixin Sun
    View author publications

    Search author on:PubMed Google Scholar

  6. Yichen Yu
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Conceptualization, L.C., A.B.,Y.S, Z.W., Z.S. and Y.Y.; methodology, L.C., A.B., and Y.S.; software, L.C., A.B., and Y.S.; validation, L.C., A.B., and Y.S.; formal analysis, L.C., A.B., Y.S., Z.W., Z.S. and Y.Y.; investigation, L.C., A.B., and Y.S.; resources, L.C., A.B., and Y.S.; data curation, L.C., A.B., and Y.S.; writing—original draft preparation, L.C., A.B.,Y.S, Z.W., Z.S. and Y.Y.; writing—review and, L.C., A.B., Y.S, Z.W., Z.S. and Y.Y.; visualization, L.C., A.B., and Y.S.; supervision, L.C., A.B., and Y.S.; project administration, L.C., A.B., and Y.S.; funding acquisition, L.C., A.B., and Y.S. All authors have read and agreed to the published version of the manuscript.

Corresponding authors

Correspondence to Lu Chen or Aniruddha Bhattacharjya.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, L., Bhattacharjya, A., Sun, Y. et al. Multi-center chameleon hashing based Blockchain integrated digital copyright transaction scheme for data redacting in Blockchain based IoT systems. Sci Rep (2026). https://doi.org/10.1038/s41598-026-45111-1

Download citation

  • Received: 17 November 2025

  • Accepted: 17 March 2026

  • Published: 20 March 2026

  • DOI: https://doi.org/10.1038/s41598-026-45111-1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Attribute encryption
  • Blockchain
  • Copyright protection
  • Copyright transaction
  • Node security management
  • Blockchain based Internet of Things (BIoT)
  • Blockchain based Industrial Internet of Things (BIIOT)
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics