2015
DOI: 10.1002/sec.1188
|View full text |Cite
|
Sign up to set email alerts
|

A robust and privacy‐preserving aggregation scheme for secure smart grid communications in digital communities

Abstract: By offering indisputable advantages over traditional grid including remote readings and load balancing, smart grid is regarded as the modernization of the electricity delivery system. In this paper, we propose a privacy-preserving and secure multi-dimensional aggregation scheme for smart grid communications in digital communities. By integrating privacy homomorphism encryption with aggregation signature scheme, data authentication and integrity protection are performed and proved without disclosing any fine-gr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
14
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…Anonymity is generally achieved by the use of cryptographic schemes, e.g. symmetric encryption [2,6,7,30] or more sophisticated schemes like homomorphic encryption [8,37,38,39,31,40,41,42,43,46], homomorphic aggregation of signatures [36] and homomorphic encryption with re-randomization applying a proxy [5]. By contrast, Groat et al [44] propose the use of randomized arrays instead of a cryptographic system.…”
Section: Related Workmentioning
confidence: 94%
See 2 more Smart Citations
“…Anonymity is generally achieved by the use of cryptographic schemes, e.g. symmetric encryption [2,6,7,30] or more sophisticated schemes like homomorphic encryption [8,37,38,39,31,40,41,42,43,46], homomorphic aggregation of signatures [36] and homomorphic encryption with re-randomization applying a proxy [5]. By contrast, Groat et al [44] propose the use of randomized arrays instead of a cryptographic system.…”
Section: Related Workmentioning
confidence: 94%
“…Privacy preservation against observers is considered in [2,3,5,7,8,29,26,44,31,41,42,46,36,25,48]. The use of cryptography is demanding to manage this issue [2,3,5,7,8,28,29,26,38,46,36,25,48], as well as randomized arrays or negative surveys [44].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thereafter, a one-time signature scheme was proposed by Zaverucha et al [14] that supports aggregation and batch verification. Other signature schemes have also been proposed for the smart grid network [15], [16], [17]. Li et al [15] presented an approach to authenticate data aggregation in smart grid via deploying signature aggregation.…”
Section: Related Workmentioning
confidence: 99%
“…Vaidya et al [16] proposed elliptic curve cryptography-based digital signature scheme for remote access to home area networks. Fu et al [17] proposed a multi-dimensional aggregation signature scheme for smart grid communications. However, none of these schemes fulfills our communication and system requirements for secure command delivery.…”
Section: Related Workmentioning
confidence: 99%