2014
DOI: 10.4028/www.scientific.net/amr.960-961.832
|View full text |Cite
|
Sign up to set email alerts
|

The Scheme of Identity-Based Aggregation Signcryption in Smart Grid

Abstract: Smart grid puts forward high requirements for the equipment to access authentication, which achieves openness and real-time performance in mart grid. The users’ identities need to protect, in the meanwhile, identity authentication and data encryption should be efficient. According to the characteristics of smart grid, this paper proposed an identity-based aggregation signcryption scheme which combined pseudonymous ID with batch verification. The scheme adopted the pseudonym technology to achieve the user ident… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…In addition, the scheme can be affected by larger bandwidth requirements. Chen and Zhang [41], coined the concept of data aggregation with identity-based signcryption to facilitate the SG technology. The authors use a pseudonym technology for achieving the identity of the user.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, the scheme can be affected by larger bandwidth requirements. Chen and Zhang [41], coined the concept of data aggregation with identity-based signcryption to facilitate the SG technology. The authors use a pseudonym technology for achieving the identity of the user.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In EPPDC, we assume that the SM's signature can be converted into the same as the existing literatures such as [7][8][9][10][11] using bilinear pairing, which can also perform the bath verification [7]. So here we mainly discuss the computation complexity of messages turning to , the signature of BGW, verification of BGW's signature, and recovery for the original message .…”
Section: Computation Overheadmentioning
confidence: 99%
“…And existing homomorphic encryption to achieve privacy preserving is based on the computational expensive operations [7,9], which may not be desirable for smart grids with limited resources in terms of both bandwidth and computation. And the existing signcryption based schemes in smart grid [10,11] cannot meet forward secrecy. This paper proposes an efficient privacy-preserving data collection scheme for smart grid, which is based on the blind signature and the key distribution scheme.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations