Zhao et al., 2016 - Google Patents
Privacy protection scheme based on remote anonymous attestation for trusted smart metersZhao et al., 2016
- Document ID
- 17085166248248212365
- Author
- Zhao J
- Liu J
- Qin Z
- Ren K
- Publication year
- Publication venue
- IEEE Transactions on Smart Grid
External Links
Snippet
The emergence of smart grids has considerably improved the quality of life. However, the real-time electric usage information transmitted by smart meters reveals consumers' private information. Based on the remote anonymous attestation technology in trusted computing …
- 238000005516 engineering process 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Communication or information technology specific aspects supporting electrical power generation, transmission, distribution or end-user application management
- Y04S40/20—Information technology specific aspects
- Y04S40/24—Arrangements for network security or for protecting computers or computer systems against unauthorised activity, e.g. cyber security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhao et al. | Privacy protection scheme based on remote anonymous attestation for trusted smart meters | |
Wang et al. | Fault-tolerant multisubset aggregation scheme for smart grid | |
Zuo et al. | Privacy-preserving multidimensional data aggregation scheme without trusted authority in smart grid | |
CN111131148B (en) | A smart grid-oriented privacy-protectable data aggregation method and system | |
Gao et al. | GridMonitoring: Secured sovereign blockchain based monitoring on smart grid | |
Rial et al. | Privacy-preserving smart metering | |
US10037544B2 (en) | Technologies for collecting advertising statistics in a privacy sensitive manner | |
Anzalchi et al. | A survey on security assessment of metering infrastructure in smart grid systems | |
CN114580029A (en) | Block chain digital asset privacy protection method, device, equipment and storage medium | |
CN102934392B (en) | Private overlay for information network | |
Le et al. | A hybrid blockchain-based log management scheme with nonrepudiation for smart grids | |
Zhang et al. | Lightweight multidimensional encrypted data aggregation scheme with fault tolerance for fog-assisted smart grids | |
CN103036884A (en) | Data protection method and system based on homomorphic encryption | |
Zhang et al. | A privacy protection scheme for smart meter that can verify terminal’s trustworthiness | |
Karopoulos et al. | MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem | |
Akgün et al. | A privacy-preserving scheme for smart grid using trusted execution environment | |
Wu et al. | Privacy-preserving and traceable blockchain-based charging payment scheme for electric vehicles | |
Wang et al. | Lightweight privacy-preserving data aggregation protocol against internal attacks in smart grid | |
Lu et al. | Transactive energy system deployment over insecure communication links | |
Chen et al. | A resilient group-based multisubset data aggregation scheme for smart grid | |
Jiang et al. | Secure and privacy-preserving energy trading scheme based on blockchain | |
Wu et al. | VP $^{2} $2-Match: Verifiable Privacy-Aware and Personalized Crowdsourcing Task Matching via Blockchain | |
Paverd | Enhancing communication privacy using trustworthy remote entities | |
Li et al. | Backdoor-resistant public data integrity verification scheme based on smart contracts | |
Kiarie et al. | Application of spritz encryption in smart meters to protect consumer data |