2021
DOI: 10.1007/978-3-030-75075-6_57
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Privacy-Preserving Billing Protocol for Smart Metering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…The time overhead for hash computation is parameterized as C h = 0.01215 and the overhead for signature verification is C v = 0.00309. These parameter settings are referenced from the study [13]. As depicted in Fig.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The time overhead for hash computation is parameterized as C h = 0.01215 and the overhead for signature verification is C v = 0.00309. These parameter settings are referenced from the study [13]. As depicted in Fig.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Non-degeneracy where Π( , ) is a generator of 2 if is a [25] is an unconditionally hiding and computationally binding scheme that uses secure Elliptic Curve Cryptography (ECC) technology and the intractability of ECDLP, showing perfect privacy-preserving capability. Typically, there are two types of ECPC: the one is nonprivacy-preserving ECPC (NPPPC) [26], the other one is zeroknowledge proof ECPC (zkPC) [27]. The general workflow of the two schemes can be described as the three steps: In zkPC, the verifier will first send a challenge factor to the prover, then the prover will recalculate a new encrypted message 1 with , and send back to the verifier.…”
Section: A Preliminariesmentioning
confidence: 99%
“…Two existing authentication schemes are chosen as the comparison groups, . ., the NPPPC [26] and the zkPC [27] algorithms.…”
Section: A Simulation Setupmentioning
confidence: 99%