Different from the traditional grid, smart grid builds a real-time connection network between the user and the grid company by smart terminals, which can achieve bidirectional data transmission and information control. In smart grid, the smart meters send various information to the power generators and substations. Frequent data collection meets real-time management, but it tends to raise privacy concerns from the users about privacy information leakage. Based on the blind signature and the key distribution scheme, an efficient and privacy-preserving data collection (EPPDC) scheme is proposed for smart grid to cope with the above problems. In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. Furthermore, performance analysis shows that EPPDC scheme has less computation cost than existing scheme.
1. Introduction
Smart grid is one of the most important public infrastructures for smart cities. It builds a real-time connection network between the user and the grid company by smart terminals and supports bidirectional data transmission and information control. Depending on it, smart cities could ensure resilient supply and delivery of energy, which help smart cities to fulfil many enhanced and innovative functions and even more efficiencies compared with traditional cities. Furthermore, smart grid can also facilitate coordination among people who are responsible for public safety and the public, such as urban officials and infrastructure operators [1]. The advantage of smart grid is attracting more and more attention and research in smart city projects. Currently, around one-third of the smart city projects are primarily focused on smart grid or other energy innovations. Almost half of smart city strategies include energy-focused projects [2].
Smart grid can support the bidirectional information flow between the power consumer and the utility provider [3]. This two-way interaction allows electricity to be generated in real-time based on consumers' demands and power requests. As an important technique in smart cities, the advanced metering will affect not only the power sector but also other utilities such as gas/heating and water which will make use of smart meters to read and process consumption data remotely [4]. In smart cities, each house may contain a smart meter connecting to all electric appliances in the house. The utility transmits requests and commands to the smart meters and gathers and analyzes power usage data responded by each smart meter. If being leaked, that information will indicate not only the amount of energy consumed by each user but also behaviors like when they are at home, at work, or traveling [5]. Furthermore, it is possible to infer what types of home appliances are used by attackers who compromise users' home area networks. If a criminal or malicious attacker can determine when a user is not at home, they may break into his/her house at such a time. And energy information can support burglars or provide business intelligence to competitors [6]. By this information, the users' habits or lifestyles can be tracked. And a series of problems arises in case of information leakage. Thus, authentication and user privacy preservation are two important security issues on the information flow in smart grid.
Thus, there is need to design schemes which can achieve data transmission between smart meters and smart grid provider with privacy preserving. This paper just studies the privacy-preserving data collection scheme for smart grid.
2. Related Works
The proposed privacy-preserving schemes about smart grid are mainly constructed by two kinds of cryptographic tools, homomorphic encryption [7–9] and signcryption [10, 11]. By homomorphic encryption, smart meters (SMs) encrypt the messages and send them to gateway (BGW), but gateway cannot get any users' messages without the system private key. Then, gateway signs encrypted messages and sends them to control center (CC). Based on the property of homomorphic encryption, control center can make use of the system private key to recover every user's messages.
Secure data aggregation schemes in smart grid have been investigated by several researchers. Lu et al. proposed a privacy-preserving aggregation scheme [7], which is based on the homomorphic Paillier cryptosystem. But in [7], it is assumed that the session keys between SM and BGW are unchanged. Once an adversary compromises the session keys, can decrypt any previous response message. Based on [7], Li et al. proposed a privacy-preserving demand and response scheme with adaptive key evolution [9]. Both [7, 9] make use of homomorphic encryption to achieve privacy preserving, and they can meet aggregation for some data. In addition, several researchers focused on privacy-preserving aggregation in different conditions by using multiparty computation [12, 13], differential privacy [14], and the aggregated pseudostatus variation [15]. As signcryption based schemes, they can complete digital signature and encryption for a message in one time. In particular, SMs signcrypt the messages and send them to gateway. Gateway cannot get any users' messages from the encrypted messages. Then, gateway signs and sends encrypted messages to control center. Control center can recover every user's messages by the shared key between CC and SMs. In [10], an identity-based signcryption scheme for smart grid was proposed. But in [10], the management of pseudonymous ID is a problem. Reference [11] adopted the pseudonym technology to achieve the user identity anonymity and adopted the signcryption to complete digital signature and encryption in one time in smart grid.
However, the smart grid needs not only to protect users' sensitive information but also to meet their demands for personalized data application with multilevel and multigranularity. Thus many users' messages cannot be aggregated, which should be sent to control center detail by detail. And existing homomorphic encryption to achieve privacy preserving is based on the computational expensive operations [7, 9], which may not be desirable for smart grids with limited resources in terms of both bandwidth and computation. And the existing signcryption based schemes in smart grid [10, 11] cannot meet forward secrecy.
This paper proposes an efficient privacy-preserving data collection scheme for smart grid, which is based on the blind signature and the key distribution scheme. In this scheme, users' data information is transmitted to the local aggregator via gateway, while gateway cannot get any users' messages. Moreover, this scheme can achieve forward secrecy of SM's session key, and evolution of SM's private keys.
The remainder of paper is organized as follows. Section 3 introduces models and design goal. Section 4 describes preliminaries. Section 5 presents the proposed EPPDC scheme. Section 6 shows the security analysis and the computation overhead of the scheme in this paper, respectively. Finally, Section 7 makes a conclusion.
3. Models and Design Goal
In this section, we give the system model, security model, and the design goal.
3.1. System Model
As shown in Figure 1, smart grid is divided into a number of hierarchical networks, which is comprised of control center (CC), district area network (DAN), building area network (BAN), and home area network (HAN). The CC covers DANs. For the sake of simplicity, we assume that each DAN comprises BANs and each BAN comprises HANs. Each HAN is assigned a smart meter (SM) enabling an automated, bidirectional communication between the CC and the HAN users. Meantime, each BAN is equipped with a gateway (BGW) and each DAN is equipped with a local aggregator (LAG). And each SM can directly communicate with LAG via the BGW.
Hierarchical architecture of smart grid.
In this paper, the system model of smart grid contains 5 parties, including trusted authority (TA), central aggregator (CAG), LAG, BGW, and SM. LAG is the entity that can directly communicate with CAG on behalf of those geographically dispersed HANs. TA belongs to some independent organizations like Regional Transmission Organizations (RTO) or Independent System Operators (ISO). TA does the system initiation, such as generating public system parameters and assigning private key for each entity.
Then we give a partial relationship for smart grid in China, which is shown in Figure 2. The provincial operator is viewed as central aggregator CAG, and municipal operator is viewed as LAG. For example, there is focus on the Northwest China. It has a CAG located in Shaanxi and multiple LAGs dispersed in Xi'an, Hanzhong, Yulin, and other towns. And ISO, Northwest China, plays the role of TA. The provincial operator is responsible for generating and transmitting parameters of CAG, predicting flexible power demand and managing renewable generation in its province. Generally, the provincial operator can refer to municipal electricity demand curve to make power supply plan and generation dispatching plan with a day ahead. The municipal operator is responsible for generating networks parameters and aggregating the power demand. At present in China, the communication between the provincial operator and the municipal operator is used by fiber optic link which is assumed to be safe. The municipal operator can refer to load curve. According to preferred load curve, time of use (TOU) prices, and customers demand, each BAN makes bids in the electricity market. Both municipal and BAN operator need real-time communication and data management. Usually, wireless communication is used to transfer data between BGW and SM.
An envisioned relationship diagram for smart grid in China.
3.2. Security Model
In our security model, CAG and LAG are trusted by all parties and are infeasible for any adversary to compromise. BGW can comply with the scheme but with diligent curiosity. Thus BGW possibly gets the user's privacy information in the process of implementing the scheme. We consider the following security goals.
Confidentiality: the messages sent to LAG from SM should be confidential; that is, if an adversary captures the messages, it cannot identify the encrypted messages.
Authenticity and data integrity: BGW and HAN users should be authenticated by LAG and BGW each other, respectively. Meanwhile, if an adversary modifies the messages, the malicious operations can be detected.
Privacy preservation: the users' electricity information should not be disclosed to the undesirable entities. Privacy preservation should meet the anonymous authentication and data encryption, which make attacker not able to get any information from any of the users. In smart grid, if an adversary hacks into the database of BGWs, it cannot determine the contents of ciphertexts. In order to protect the users' privacy, even BGW cannot determine the detailed electrical information to certain users.
Evolution of users' private keys: the evolution of users' private keys should be achieved. If an adversary compromises any previous private key of a HAN user, cannot use it currently or in the future.
3.3. Design Goal
Under the above models, our design goal is to develop an efficient privacy-preserving scheme for data collection in smart grid. Specifically, the following two desirable objectives will be achieved.
The proposed privacy-preserving scheme should achieve the message source authentication, data integrity, and the confidentiality of the messages.
The proposed scheme should be cost-effective in terms of computation and communication overheads.
4. Preliminaries
In this section, we review bilinear pairings, hash function and HMAC [16], group key distribution scheme [17], and Nyberg-Rueppel blind signature technology [18], which will serve as the basis of the proposed scheme.
4.1. Bilinear Pairings
Let be a cyclic additive group of prime order q and let be a cyclic multiplicative group of the same order. A map e: is called a bilinear map if it satisfies the following properties:
(1) bilinearity: and , for all ;
(2) nondegeneracy: there exists such that ;
(3) computability: there is an efficient algorithm to compute for .
4.2. Hash Function and HMAC
A one-way hash function is said to be secure if the following properties are satisfied.
can take a message of arbitrary length as input and produce a message digest of a fixed-length output.
Given x, it is easy to compute . However, it is hard to compute given y.
Given x, it is computationally infeasible to find such that .
Hash-based message authentication code (HMAC) is a specific construction for computing a message authentication code (MAC) using a cryptographic hash function in combination with a secret key. Both data integrity and authenticity of a message can be achieved using such a technique. Due to the property of hash functions, an HMAC value can be computed in a much shorter time than a traditional digital signature. In this paper, we denote the HMAC value on message M is HMACK(M) using the secret key K.
4.3. Group Key Distribution Scheme
The purpose of group key distribution is to distribute keys to selected group members so that each of the selected group members shares a distinct personal key with the group manager, but the other group members cannot get any information of the keys. In [17], the group manager broadcasted a message, and all the selected group members could derive their keys from the message. The approach of [17] chose a random t-degree polynomial from and selected for each group member as the shared person key. The group manager constructed a single broadcast polynomial such that, for a selected group member , could be recovered from the knowledge of and the personal secret . But for any revoked group member, , could not be determined from and .
In [17], was constructed by with the help of a revocation polynomial and a masking polynomial . The revocation polynomial was constructed in such a way that for any selected group member , but for any revoked group member . During setup phase, each group member had its own personal secret , which might be distributed by the group manager through the secure communication channel between each group member and the group manager. Thus, for any selected group member , new personal key could be computed by , but for any revoked group member , new personal key could not be computed because . Specific steps were as follows.
Setup: the group manager randomly picked a -degree masking polynomial, , from . Each group member got the personal secret from the group manager.
Broadcast: given a set of revoked group members , the group manager distributed the shares of t-degree polynomial to nonrevoked group members via the following broadcast message: , where the revocation polynomial .
Personal key recovery: if any nonrevoked group member received such a broadcast message, it evaluated the polynomial at point i and got . Because knew and , it could compute the new personal key .
4.4. Nyberg-Rueppel Blind Signature
Blind signatures enable users to obtain valid signatures on a message without revealing its content to the signer. Nyberg-Rueppel blind signature scheme was proposed by Camenisch et al., which was based on the discrete logarithm problem [18]. The scheme had three parts as follows.
Setup system parameters: the system parameters consisted of a prime p, a prime factor q of , and an element of order q. The signer's private key was a random element , while the corresponding public key was .
Sign: Bob could obtain a valid signature on a message m from Alice without revealing its content to Alice.
Alice randomly selected , computed , and sent to Bob.
Bob selected at random and computed and . Bob checked whether it was satisfied with . If this was not the case, a new () would be chosen until it was satisfied with . Then, Bob sent to Alice.
Alice computed and sent to Bob.
Bob computed . was the signature of Alice on message m.
Verify: anyone could verify the validity of the signature () on message m by
5. EPPDC Scheme
Based on the blind signature and the key distribution scheme, this section gives the EPPDC scheme for smart grid. This scheme can achieve that the users' data is transmitted to the LAG via BGW with privacy preserving. In this section, we propose the scheme, which consists of five phases: system initialization, certificate issuing, user registration, data collection, and key evolution.
5.1. System Initialization
We assume that TA will initialize the whole system. TA chooses the following:
primes p and q such that , and ;
an element with order q; that is, , and ;
a one-way hash function ;
a security parameter and bilinear group () with prime order , which satisfies with g being a generator of G;
a random number as TA's private key so that .
Then, TA computes its public key and publishes the tuple as the system parameters.
5.2. Certificate Issuing
During this phase, TA verifies the identity and issues the certificate for every entity. These entities include all the CAGs, LAGs, and BGWs. As an example, TA issues the certificate for a certain as follows.
TA chooses a random number as the 's private key and computes the 's public key .
TA generates the signature , where is a signature on using TA's private key SKTA.
TA delivers and to , where . The delivery of must be via a secure channel, such as a Secure Socket Layer.
5.3. User Registration
Before accessing smart grid, every SM needs to get a certificate from TA and register in certain LAG which SM belongs to. Assume indicates that a certain SM belongs to . In Figure 3, an example of user registration for is as follows.
The flow chart of registration.
After TA verifies the identity of , TA delivers the and certificate to , which is the same as the process in Section 5.2.
encrypts the message by and sends it to , where T is the current timestamp.
decrypts the received message by its private key . verifies the validity of timestamp T, and . If all those are available, go to step (4). Otherwise, go back to Step (2).
chooses a random number and computes , , and . Then, sends and to .
can get noninteractively shared key and can verify the correctness of . If is consistent, go to Step (6). Otherwise, go back to Step (2).
sends to , where TS is the current timestamp.
verifies the validity of signature in Step (6). If it is available, go to Step (8). Otherwise, go back to Step (4).
stores the , , and in its database. Then sends the permit defined as to , where is the current timestamp and d is the expiry length of time.
5.4. Data Collection
When a certain needs to make statistical analysis and collect energy information in its DAN, broadcasts the data collection command to its subordinate BGWs. Similarly, each BGW will broadcast the data collection command to its subordinate SMs. As an example, the process of data collection from to is as follows.
(I) Each BGW Collects Eligible SMs' Permits
After receiving the data collection command from , chooses a random number and computes . Here is a certain BGW who is 's subordinate and 's superior. Then, encrypts the message by and sends it to , where is the current timestamp.
verifies the validity of using Algorithm 1. For eligible , chooses two random numbers , and computes , , , where , , and .
sends the message to , where is the current timestamp.
After receiving , can get noninteractively shared key and compute .
If the value of HMAC is consistent, go to Step (5). Otherwise, go back to Step (1).
sends to , where is the current timestamp.
When , verifies the correctness of received messages in Step (5) by HMAC, where is the limit for time difference. Then, collects all eligible SMs' permits and sends them to .
Algorithm 1: The process of verifying .
Require:
(1) Decrypt by 's private key .
(2) Verify − < d, d is the expiry length of time.
(3) if is valid then
Verify by .
if is valid then
Verify by .
if is valid then
accept .
(4) end if
(5) end if
(6) end if
(II) Generate the Shared Blind Factors between LAG and Every SM
After receiving all the permits from , confirms the total of permits as . Then finds the corresponding in its database, where is the shared key of with . And generates the message by using Algorithm 2.
sends message to .
After receiving the message from , stores in its database and broadcasts to its every subordinate SM. If SM's permit is eligible, SM can recover and . As an example, can get + and , respectively. In the following, is an example of data collection, which is the same as other SMs.
computes two blind factors and , where H is a one-way hash function.
Algorithm 2: Message generation algorithm for LAG.
Require: g, p, q,
(1) Construct function ,
where from to indicates
shared keys of LAG with SMs which permit past validation.
(2) Select random numbers and .
(3) Generate , .
(4) Select a random number .
(5) Compute .
Return
(III) LAG Collects Data from SM via BGW
reads the current electricity information and computes . sends to , where is the current timestamp.
verifies the validity of signature in Step (1). If the signature is valid, go to Step (3). Otherwise, requires resending the message as in Step (1) within the valid time range.
chooses a random number and computes = , = . signs the message with = + using blind signature.
sends and to .
can get 's current electricity information using Algorithm 3.
Algorithm 3: The process of recovering message for LAG.
(1) Verify , where is the limit for time difference.
(2) ifthen
compute = .
(3) Verify the validity of .
(4) if HMAC is valid then
find in its database according to .
(5) Computes , .
(6) Get ,
,
.
(7) Judge
if equation holds then
Record the message and signature (, ) in the corresponding database.
(8) end if
(9) end if
(10) end if
5.5. Key Evolution
The 's permit is only valid from to . After , the permit is automatically revoked if does not apply for a new permit. Assuming is the corresponding number of days for d, here we extend the shared key to dimensional vector . For dimensional vector , , , and , where H is a one-way hash function. Note that the extension does not influence the previous EPPDC scheme. Then, both and can deduce dimensional shared key within the terms of permit.
Here we assume that every shared key is valid for one day. dimensional shared key is valid for days during the validity of permit. Accordingly, both and can confirm the intraday shared key from dimensional key .
Every only stores the intraday shared key within permit validity period. The day before the expiration of , applies for registration in again. For eligible , will issue the new permit and form the new shared key to . When previous permit has expired, deletes previous permit and . Thus, the shared key evolution is achieved.
6. Security Analysis and Computation Overhead
In this section, we analyze the security properties and the computation of the EPPDC scheme.
6.1. Security Analysis
EPPDC scheme can achieve data collection from to via . And EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys.
Property 1 (correctness).
In EPPDC scheme, can verify the blind signature of and recover the message sent by .
Proof.
During Stage III of data collection in EPPDC scheme, sends the message and to . can find the corresponding in its database according to and the current timestamp. Then, recovers the current electricity information using Algorithm 3, which is proved by
The 's signature on is , which can be proved by
Property 2 (to resist replay attack).
In EPPDC scheme, we assume that there is an adversary who can intercept and capture the messages sent by s. When adversary resends the messages, can detect the replay attack based on the 's signature or with the current timestamp. For the same reason, can also detect the replay attack, when an adversary resends the 's messages.
Property 3 (confidentiality).
In EPPDC scheme, the messages maintain their confidentiality when messages are sent to from .
Proof.
During Stage III of data collection in EPPDC scheme, has processed the information into by blind factors and , before sends the messages to .
We consider the following game played between a challenge and an adversary . runs the system initialization and sends the system parameters to . performs a polynomial bounded number of queries (these queries may be made adaptively; that is, each query may depend on the answer to the previous queries). By queries, can get many couples of and , where . Based on discrete logarithm problem, cannot get the blind factors and from and . For the same reason, cannot get if it does not know and .
Therefore, an adversary cannot get , even if cannot get too. Thus the messages maintain their confidentiality when messages are sent to from .
Property 4 (nonrepudiation and unforgeability).
During Stage III of data collection in EPPDC scheme, sends and its signature to , which is sent to by at a later step.
We consider the following game played between a challenge and an adversary . performs a polynomial bounded number of adaptive queries. By queries, can get many couples of and . Based on the properties of signature [19], cannot forge the 's signature on message . Thus, cannot repudiate being sent by himself.
In the following steps, signs the message via blind signature with its private key . By adaptive queries, can get many couples of and . Based on discrete logarithm problem, cannot get 's private key . Based on discrete logarithm problem, if forges 's blind signature, the signature will not be authenticated by making use of (3). Thus, cannot repudiate () being sent by himself.
Furthermore, based on the properties of signature, the messages sent by and are provided with the source authentication and data integrity.
Property 5 (forward security).
In EPPDC scheme, the permit has a validity period d. When permit is valid, both and can noninteractively share dimensional key , where is the corresponding number of days for d. Thereby in days, and use different shared key every day.
In the key evolution phase, deletes the previous shared key after it has computed the new shared key . If an adversary compromises a HAN user's , it gets the current shared key . Assume that an adversary can perform a polynomial bounded number of adaptive queries for a challenge . By queries, can get many shared keys . Based on the property of one-way for hash function, cannot get any previous shared key making using of the current shared key . Thus adversary cannot compute the previous blind factor, and then it cannot get previous message m sent by SM. Therefore, EPPDC scheme provides the evolution and forward secrecy of shared key .
Finally, we present the comparison results of security levels in Table 1. It can be seen that scheme [7] and scheme [10] achieve confidentiality, authenticity, and data integrity and scheme [9] cannot resist replay attack.
In EPPDC scheme, every sends its processed messages and its corresponding signatures to BGW. BGW verifies the validity of SM's signature. For available signature, BGW signs message making use of blind signature and sends it to LAG. LAG can verify that the message is indeed sent by BGW and SM. Furthermore, LAG can recover the original message m.
In EPPDC, we assume that the SM's signature can be converted into the same as the existing literatures such as [7–11] using bilinear pairing, which can also perform the bath verification [7]. So here we mainly discuss the computation complexity of messages m turning to , the signature of BGW, verification of BGW's signature, and recovery for the original message m. Because the computation complexity is similar in [7, 9] which are both realized by homomorphic encryption, we only consider [7] in the following comparisons.
In EPPDC scheme, needs 2 exponentiation operations, 3 multiplication operations, and 1 inverse operation in to blind message m to . In [7], needs 2 exponentiation operations and 1 multiplication operation in to encrypt message m to C using homomorphic encryption. In [10], encrypts message m to C making use of AES block cipher.
In EPPDC scheme, BGW can perform the bath verification. BGW makes use of blind signature to sign blinded messages which are authenticated. Here BGW only needs 1 addition operation and 1 multiplication operation in . In [7], BGW needs 1 multiplication operation in and 1 hash operation. In [10], BGW needs 1 addition operation and 2 multiplication operations in .
In EPPDC scheme, LAG verifies that the message is indeed sent by BGW and recovers the original message m which needs 4 exponentiation operations, 6 multiplication operations, 1 addition operation, and 2 inverse operations in . In [7], LAG can verify that the message is indeed sent by BGW and recover the original message m, which needs 1 exponentiation operation, 1 multiplication operation in , 2 pairing operations, and 1 hash operation. In [10], LAG can verify that the message is indeed sent by BGW and recover the original message m, which needs 2 pairing operations, 1 multiplication operation in , 1 exponentiation operation in , 2 exponentiation operations in , and AES decryption.
Since the AES encryption or decryption and hash function are negligible compared with exponentiation and pairing operations, here we mainly consider the computation overhead for other operations. Table 2 gives the test time for the involved cryptography operations [20]. The experiments are conducted on a computer with Intel i5-3210-2.5 GHz CPU and 4-GB RAM.
Cryptographic operations execution time.
Denotation
Time (ms)
An exponentiation in
0.067
An addition in
0.001
A multiplication in
0.001
An inverse operation in
0.004
An addition in
0.038
A multiplication in
8.006
A multiplication in
0.013
An exponentiation in
1.882
A pairing operation
16.064
When a message is sent by SM, the comparisons of computation complexity for SM, BGW, and LAG are shown in Table 3.
When n messages are sent by different SMs to the same LAG, LAG can make use of the bath verification to reduce pairing operation from to [7, 10].
With the exact operation costs, we depict the variation of computation costs in terms of the message number n in Figures 4 and 5, which is for BGW and LAG, respectively. From the figures, it can be obviously shown that the EPPDC scheme largely reduces the computation complexity for both BGW and LAG.
Computation cost of BGW.
Computation cost of LAG.
7. Conclusions
This paper proposes an efficient and privacy-preserving data collection scheme for smart grid, which is based on the blind signature and the key distribution scheme. This scheme can achieve that the users' data information is transmitted to the local aggregator through building gateway. And we analyze the EPPDC scheme. The analysis shows that the scheme not only provides privacy preserving but also has less computation cost than existing schemes.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work was supported in part by the Natural Science Foundation of China (61102056, 61201132), Fundamental Research Funds for the Central Universities of China (K5051301013), and the 111 Project of China (B08038).
U.S. Department of EnergyThe Smart Grid: An Introduction2008Washington, DC, USAU.S. Department of Energy
4.
BojanićS.GarcíaO. N.-T.Security aspects of advanced metering infrastructuresProceedings of the 9th Symposium on Industrial Electronics (INDEL '12)November 2012Banja Luka, Bosnia and Herzegovina205208
CristinaR.GiacomoV.AntonioC.Privacy-preserving smart metering with multiple data consumersComputer Networks201357716991713
7.
LuR.LiangX.LiX.LinX.ShenX.EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communicationsIEEE Transactions on Parallel and Distributed Systems201223916211632
8.
SaputroN.AkkayaK.On preserving user privacy in Smart Grid advanced metering infrastructure applicationsSecurity and Communication Networks20147120622010.1002/sec.7062-s2.0-84894094066
9.
LiH.LinX.YangH.LiangX.LuR.ShenX.EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart gridIEEE Transactions on Parallel and Distributed Systems20142582053206410.1109/TPDS.2013.124
10.
SoH. K.-H.KwokS. H. M.LamE. Y.LuiK.-S.Zero-configuration identity-based signcryption scheme for smart gridProceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm '10)October 2010321326
11.
ChenJ.ZhangY. Y.The scheme of identity-based aggregation signcryption in smart gridAdvanced Materials Research2014960-961832835
12.
RottondiC.VerticaleG.CaponeA.Privacy-preserving smart metering with multiple data consumersComputer Networks201357716991713
13.
RottondiC.VerticaleG.KraußC.Distributed privacy-preserving aggregation of metering data in smart gridsIEEE Journal on Selected Areas in Communications20133171342135410.1109/JSAC.2013.1307162-s2.0-84880204032
14.
JiaW.ZhuH.CaoZ.DongX.XiaoC.Human-factor-aware privacy-preserving aggregation in smart gridIEEE Systems Journal201482598607
15.
LiuH.NingH.ZhangY.YangL. T.Aggregated-proofs based privacy-preserving authentication for V2G networks in the smart gridIEEE Transactions on Smart Grid20123417221733
16.
KrawczykH.CanettiR.BellareM.HMAC: keyed-hashing for message authenticationRFC19972104
17.
LiuD.NingP.SunK.Efficient self-healing group key distribution with revocation capabilityProceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)October 2003Washington, DC, USA231240
18.
CamenischJ. L.PiveteauJ.-M.StadlerM. A.Blind signatures based on the discrete logarithm problemAdvances in Cryptology—EUROCRYPT '941995950428432Lecture Notes in Computer Science10.1007/BFb0053458
19.
MaoW.Modern Cryptography: Theory and Practice2003Prentice Hall, PTR