CN106549767A - A kind of data authentication with secret protection and tracing system - Google Patents
A kind of data authentication with secret protection and tracing system Download PDFInfo
- Publication number
- CN106549767A CN106549767A CN201610972257.2A CN201610972257A CN106549767A CN 106549767 A CN106549767 A CN 106549767A CN 201610972257 A CN201610972257 A CN 201610972257A CN 106549767 A CN106549767 A CN 106549767A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- sent
- control centre
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
- H04L9/3221—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of data authentication with secret protection and tracing system, including:Data collecting point, for collecting the detail data of checking user power utilization, is analyzed according to the data for counting on, and analysis result is sent to control centre, if pinpointing the problems data, its data and signing messages are sent to control centre in the lump;Control centre, for the analysis result that receiving data bleeding point sends, if receiving the signature of the problem data sent by data point, whether the associated key check problem data that trusted third party's offer can be first passed through are sent by same signer, trace the identity of the sender of problem data afterwards by trusted third party's application;Trusted third party, for being responsible for generating group's association key and managing user;Intelligent electric meter, for, after obtaining Third Party Authentication and possessing corresponding group cipher, sending corresponding electricity consumption data to control centre and correspondence user.Compared with prior art, the present invention has the advantages that safe.
Description
Technical field
The present invention relates to a kind of data authentication and tracing system, more particularly, to it is a kind of for intelligent grid with privacy
The data authentication and tracing system of protection.
Background technology
Intelligent grid, is also called knowledge type electrical network or modern power network, is by modern advanced sensing and e measurement technology, letter
The novel power grid that message communication technology, control technology and original power transmission and distribution infrastructure are highly integrated and are formed.With traditional electricity
Net is compared, and intelligent grid has the new features such as two-way communication, distribution type electric energy, dynamic price and load control.In order that intelligence
The various intelligent Services that energy electrical network can be provided, need intelligent electric meter the real-time power information of user to be issued in power supply control
The heart (sends a power information) such as per 15 minutes.But, the mistake of customer consumption data is reported on this high frequency ground to control centre
Journey, may cause serious privacy leakage problem, this integrity just to user data transmission in intelligent grid, confidentiality,
The problems such as attack tolerant and secret protection, proposes new challenge.
In recent years, for how to protect the privacy of user, related scholar to do substantial amounts of research.Sent out in intelligent electric meter in real time
In sending data procedures, the privacy protecting technology of user can be roughly divided into physical technique, data aggregation technique and identity anonymous skill
Art.
Physical technique mainly using energy storage device hiding the true consumption information of user, so as to reach the mesh of hiding privacy
's.Its cardinal principle is to change the user power utilization information read by intelligent electric meter by the discharge and recharge of energy storage device.By using
Rechargeable battery protecting the electricity consumption privacy of user, for example:By battery rush/discharge with the use/unuse of household electrical appliance with
1/0 representing, maintains the balance of power is measured with intelligent electric meter by the discharge and recharge of rechargeable battery, if certain section of time household electric
The power that the mean power of device is measured less than epimere time ammeter, then discharging rechargeable battery make its power with household electrical appliance and with
The power that epimere time ammeter is measured is equal, and vice versa.Formulate rechargeable battery state policy and prove that its information is let out with experiment
The speed ratio of dew is relatively low, is effectively protected the privacy of user.But the rechargeable battery in the technology is relative to other technologies original paper
Costly, and the number of times of its life-span and discharge and recharge is limited.
It is one that Bohli proposes Utilities Electric Co. first for the electricity consumption data needed for monitoring operation of power networks and prediction electricity needs
The real-time total electricity in individual region, and then propose in intelligent grid by data aggregation technique to protect privacy of user.With
Afterwards, researchers have carried out correlational study to protection privacy of user using data aggregation technique.Wherein, have same by constructing one
The method of state polymerization tree, protects the privacy of user.Most scholars construct its privacy using Paillier homomorphic cryptographies and protect
Shield scheme, Integral Thought is:Individual user constitutes a polymeric unit, makes control centre have to the total of all user power utilization amounts
With, and do not know the personal data of each user.Although above method protects individual subscriber privacy, but gathered data for polymerization
State, it is impossible to for real-time detection and tracing individual problem ammeter.
Therefore, it is real-time for ammeter send data procedures in protect user privacy, identity anonymous technology in recent years also into
For study hotspot.In identity anonymous technology, group ranking technology is a kind of digital signature encryption mode of extremely important specific form,
It is proposed in 1991 by Chaum and Van Heyst.Group signature scheme generally includes a group manager and several groups
Member, any member in group can represent group and anonymously be signed.Some scholars are proposed using based on Bilinear map
Group ranking technical protection privacy of user, though the group signature scheme for proposing is than more efficient, for signature traces aspect, due to each
The signature of signer is different, when causing inquiry, it is possible that same signer is repeatedly inquired about, wastes communication overhead.Therefore,
Relatedness group ranking algorithm is suggested, the association person in the algorithm can utilize group ranking associated key is judged two it is different
Group ranking be whether that same member produces in group, and do not reveal the information of group members, that is, still be able to ensure hideing for group members
Name property.But do not illustrate how problem data is found.
The content of the invention
The purpose of the present invention is exactly to provide a kind of with secret protection to overcome the defect of above-mentioned prior art presence
Data authentication and tracing system.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of data authentication with secret protection and tracing system, including:
Data collecting point, for collecting the detail data of checking user power utilization, is analyzed according to the data for counting on, and
Analysis result is sent to into control centre, if pinpointing the problems data, its data and signing messages control centre is sent in the lump;
Control centre, for the data that receiving data bleeding point sends, if receiving the problem data sent by data point
Whether signature, the associated key check problem data that can first pass through trusted third party's offer are sent by same signer, afterwards
The identity of the sender of problem data is traced by trusted third party's application;
Trusted third party, is one while the mechanism trusted by user and control centre, generates faciation for responsible
Close key and manage user, the intelligent electric meter of certification user simultaneously generates corresponding group cipher for which, and assist control centre to inquire about
The identity of the sender of problem data;
Intelligent electric meter, for after obtaining Third Party Authentication and possessing corresponding group cipher, every setting time to control
Center processed and correspondence user send corresponding electricity consumption data.
Described control centre provides a user with the service of electricity consumption, by analysis result, reasonably carries out energy scheduling.
Described trusted third party's input security parameter sets up customer group, and generates group master key, associated key and inquiry
Key, wherein group's master key are used for certification user validation, and whether associated key is same signer for check problem data
Sent, query key is used for the legitimacy of revene lookup request.
The ID of described user encryption oneself and corresponding ammeter numbering are sent to control centre's application for registration, control centre's note
Record ID encode with corresponding ammeter, and ID is signed with private key and be sent to user, and user uses the signature to credible
Third party proves its legitimacy, and applies into group.
After described trusted third party checking user enters group's application, corresponding group ranking key is calculated by ID.
Described intelligent electric meter encryption data and with group's master key to being sent to data collecting point after data signature.
Described data collecting point verifies received signature, and verifies the identity of sender, and authentication is into connecing immediately
Receive the data.
The judge process of described problem data is as follows:
Distance-based outlier is defined, and data collecting point defines data M=(m1,…,mn) and kernel function kM(x), wherein,
All values for M all meetArrange and define distribution equationWherein T is former data
Sample, as collected data are constantly updated, the value principle of k (x) is:
Wherein, B is kernel function field width;Explained by above-mentioned definition, data collecting point calculates detection data and sample number
According to space lengthR is setting query context, if N (M, r) less than defined domain D, then the data
It is judged as problem data.
Compared with prior art, the present invention has advantages below:
1st, group ranking is combined by the present invention with data technique is followed the trail of, different from conventional privacy tracing scheme, in we
The detection process of problem data is explained in case, has described how to judge whether a data are problem data in detail.
2nd, the function with secret protection, is effectively protected to transmission data, and malicious attacker receives user
The data transmitted can also not recover the true ID of user.
3rd, autgmentability is high, if new user adds, it is only necessary to by closing to control centre and trusted third party respectively
Method application, obtains signature key.
4th, communication and computing cost are reduced, compared with traditional group's encipherment scheme, this programme increases group ranking relatedness
Function, it may be verified that whether multiple signatures are the amount of tracing (communication overhead) that problem data is reduced carried out by same signer, effectively
Quick search problem user identity.Meanwhile, traditional group's encipherment scheme is compared, and decreases computing cost.
5th, safe, due to the zero knowledge proof in group ranking technology, the identity for being effectively guaranteed validated user is tested
Card, and malicious attacker cannot forge a signature.
Description of the drawings
Fig. 1 is user data transmission figure of the present invention.
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention
Premised on implemented, give detailed embodiment and specific operating process, but protection scope of the present invention be not limited to
Following embodiments.
A kind of data authentication with secret protection and tracing system, the system mainly include 5 entities:Data collecting point
(Collector), control centre (Control Center), trusted third party (TTP), intelligent electric meter (SM), user (User).
Wherein data collecting point collects the detail data of checking user power utilization, is analyzed according to the data for counting on, and analysis is tied
Fruit is sent to control centre.If going wrong data, the data and signing messages are sent to into control centre;Control centre to
User provides the service of electricity consumption, by analysis result, reasonably carries out energy scheduling.
If receiving the problem data of data collecting point transmission, the associated key inspection that can first pass through trusted third party's offer is asked
Whether topic data are sent by same signer, are reduced and the traffic of trusted third party, backward trusted third party apply chasing after
Look into the identity of the sender of problem data;Trusted third party be one while the mechanism trusted by user and control centre, it
It is responsible for generating group's association key and managing user, the intelligent electric meter of certification user simultaneously generates corresponding group cipher for which.Meanwhile, also
Control centre can be assisted to inquire about the identity of the sender of problem data;Intelligent electric meter is obtaining Third Party Authentication and is possessing corresponding group
After key, sent corresponding electricity consumption data will to control centre and correspondence user every 15 minutes.
Fig. 1 show user data transmission figure, by taking one of user A data transfers as an example, binding model scheme
Schematic diagram is described in detail to the method:
The first step:System initialization
A. trusted third party TTP is input into security parameter (1λ) set up group Ω1.If identity information ID and message M can distinguish table
It is shown as the binary string of k positions and n positions.G is a tradable multiplicative group, N=p1p2p3, Bilinear map e:G×G→GT,It is
One subgroup of group G, rank is p1, random selection generation unit g,VectorTo agreeing
Promise ID=(x1,…,xk)←{0,1}k;VectorCorrespondence commitment message M=(m1,…,mn)←{0,1
}n.H is hash function.Random selection number w, h, l ← G, α ← ZN, L ← ZP, calculate f=wL.Generate group master key MK1=gα, close
Connection key LK1=L, query key TK1=l.Announce common parameter:gpk1=(N, g, u, u1,…,uk,v,v1,…,vn,f,w,
H, A=e (g, g)α,H).Wherein, associated key LK1It is sent to control centre.
A. user A encrypts the ID of oneselfAAnd corresponding ammeter numbering SMAIt is sent to control centre's application for registration (encrypted form:PKAFor the public key of user A).Control centre records IDASM is encoded with corresponding ammeterA, and with private key pair
IDASignature (signature form:SKCCFor control centre's private key) and it is sent to user.User using the signature to
Trusted third party proves its legitimacy, and applies into group.
B. after trusted third party's checking user enters group's application, by IDACalculate corresponding group ranking key.Select with
Machine number r1←ZN, bi←ZP, calculateFrom groupTwo prime numbers R and R' are selected, the signature group cipher of application user is calculated
KID={ K1,K2,Calculate the correlation for generating the proof based on non-interactive type Zero Knowledge
ParameterMeanwhile, trusted third party calculates E=H (C)TK, and record < IDui,r1, C, E >, by (KID,C,Bi)
It is sent to relative users A ammeter.
Second step:Electric power data is counted
A. intelligent electric meter encryption data use group cipher KIDTo data MASignature:Intelligent electric meter selects random number s, r2←ZN,
Calculate:H1=H (C), H2=H (MA),S=(S1,S2,S3)=(K1C's,K2 -1,g-s).Wherein, meet non-friendship
Mutually product equation is matched in zero-knowledge proof:e(S1,g)e(S2,C)e(S3, C') and=A.Select random number t1,t2,t3←ZN, t is
Timestamp, calculates:T4=Cht,Select
Random number θ ← Zp, calculate Q=w-θ, c=Bif-θ.Obtain signature sigmaA=(T1,T2,T3,T4,π,Q,c,H1), last intelligent electric meter will
(MA,σA,H2) it is sent to data collecting point.
B. data collecting point checking is signed, collects data:Data collecting point verifies received signature, that is, check T4=
Cht, calculate checking H3=H (MA) whether with the H for receiving2It is equal.Prove that data are not tampered with if by above-mentioned checking.Then
The identity of checking sender, calculatesAnd substitute into equation e (T1,g)e(T2,T4)e(T3,T5)=Ae (h, π), checking is
No establishment.If so, then sender is its group members, and data collecting point receives the data.
3rd step:Data collecting point analytical data
Distance-based outlier is defined, and data collecting point defines data MA=(m1,…,mn) and kernel function kM(x), wherein,
For MAAll values all meetArrange and define distribution equationWherein T is former data
Sample, as collected data are constantly updated.The value principle of k (x) is:
Wherein, B is kernel function field width.Explained by above-mentioned definition, data collecting point calculates detection data and sample number
According to space lengthR is ad hoc inquiry scope.If N is (MA, r) less than defined domain D, then the number
It is judged that being abnormal data.Data collecting point is sent to control centre the signing messages data associated therewith.
4th step:Data is activation person follows the trail of in control centre
A. in order to be able to reduce the inquiry number of times to user real-name query person, the sender of the abnormal ammeter of effective quick search
Using associated key LK, identity, control centre verify whether multiple data signatures are signed by same ammeter.Control centre will calculate
Relating value VL=e (c, h) e (Q, the h of each signatureLK)-1。
If user A is bad data sender, and sends multiple untrue data (MA1,……,MAn), then its relating valueFor the relating value VL calculated by the signature that user A sendsAAll it is same value.Control
As long as center is sent to one user A of trusted third party and signs inquiry request, it is to avoid the identity of repeat queries user A.
B. trusted third party receives the inquiry request of control centre and the signature sigma of corresponding dataA, query key TK is used, is counted
CalculateAccording to log before, the ID of corresponding user A is searchedAAfterwards, Query Result is sent to into control centre.Control
Center processed receives Query Result, and takes corresponding measure.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
The protection domain of requirement is defined.
Claims (8)
1. a kind of data authentication with secret protection and tracing system, it is characterised in that include:
Data collecting point, for collecting the detail data of checking user power utilization, is analyzed according to the data for counting on, and will divide
Analysis result is sent to control centre, if pinpointing the problems data, its data and signing messages is sent to control centre in the lump;
Control centre, for the data that receiving data bleeding point sends, if receiving the signature of the problem data sent by data point,
Whether the associated key check problem data that trusted third party's offer can be first passed through are sent by same signer, afterwards by can
The identity of the sender of problem data is traced in letter third party's application;
Trusted third party, is one while the mechanism trusted by user and control centre, closes close for being responsible for generation faciation
Key simultaneously manages user, and the intelligent electric meter of certification user simultaneously generates corresponding group cipher for which, and assist control centre's inquiry problem
The identity of the sender of data;
Intelligent electric meter, for after obtaining Third Party Authentication and possessing corresponding group cipher, every setting time in control
The heart and correspondence user send corresponding electricity consumption data.
2. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described
Control centre provide a user with the service of electricity consumption, by analysis result, reasonably carry out energy scheduling.
3. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described
Trusted third party's input security parameter set up customer group, and generate group master key, associated key and query key, wherein group master
Key is used for certification user validation, and whether associated key is sent by same signer for check problem data, inquires about close
Key is used for the legitimacy of revene lookup request.
4. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described
User encryption oneself ID and corresponding ammeter numbering be sent to control centre's application for registration, control centre's record ID and phase
Answer ammeter to encode, and ID is signed with private key and be sent to user, user proves it to trusted third party using the signature
Legitimacy, and apply into group.
5. a kind of data authentication with secret protection according to claim 4 and tracing system, it is characterised in that described
Trusted third party checking user enter group application after, corresponding group ranking key is calculated by ID.
6. a kind of data authentication with secret protection according to claim 3 and tracing system, it is characterised in that described
Intelligent electric meter encryption data and with group's master key to being sent to data collecting point after data signature.
7. a kind of data authentication with secret protection according to claim 4 and tracing system, it is characterised in that described
Data collecting point verify received signature, and verify the identity of sender, authentication is into receiving the data immediately.
8. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described
Problem data judge process it is as follows:
Distance-based outlier is defined, and data collecting point defines data M=(m1,…,mn) and kernel function kM(x), wherein, for M
All values all meetArrange and define distribution equationWherein T is former data sample,
As collected data are constantly updated, the value principle of k (x) is:
Wherein, B is kernel function field width;Explained by above-mentioned definition, data collecting point calculates detection data with sample data
Space lengthR is setting query context, if (M, r) less than defined domain D, then the data judge N
For problem data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610972257.2A CN106549767A (en) | 2016-11-04 | 2016-11-04 | A kind of data authentication with secret protection and tracing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610972257.2A CN106549767A (en) | 2016-11-04 | 2016-11-04 | A kind of data authentication with secret protection and tracing system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106549767A true CN106549767A (en) | 2017-03-29 |
Family
ID=58395437
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610972257.2A Pending CN106549767A (en) | 2016-11-04 | 2016-11-04 | A kind of data authentication with secret protection and tracing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106549767A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108964894A (en) * | 2018-06-28 | 2018-12-07 | 上海电力学院 | A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection |
CN109510830A (en) * | 2018-11-22 | 2019-03-22 | 南方电网科学研究院有限责任公司 | A kind of authentication method of intelligent electric meter, device, medium and equipment |
CN109600233A (en) * | 2019-01-15 | 2019-04-09 | 西安电子科技大学 | Group ranking mark based on SM2 Digital Signature Algorithm signs and issues method |
CN110430050A (en) * | 2019-07-31 | 2019-11-08 | 湖南匡安网络技术有限公司 | A kind of smart grid collecting method based on secret protection |
CN112904067A (en) * | 2021-01-29 | 2021-06-04 | 桂林电子科技大学 | Real-time electricity stealing detection method based on user data privacy |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050184882A1 (en) * | 2004-02-19 | 2005-08-25 | Bruce Angelis | Utility endpoint communication scheme, such as for sequencing the order of meter reading communications for electric, gas, and water utility meters |
CN102882688A (en) * | 2012-10-24 | 2013-01-16 | 北京邮电大学 | Lightweight authentication and key agreement protocol applicable to electric information acquisition |
CN103763094A (en) * | 2014-01-03 | 2014-04-30 | 沈阳中科博微自动化技术有限公司 | Intelligent electric meter system safety monitoring information processing method |
CN104219056A (en) * | 2014-09-16 | 2014-12-17 | 西安电子科技大学 | Privacy protection type real-time electric charge collecting method for intelligent power grid |
CN103490880B (en) * | 2013-10-07 | 2016-04-13 | 西安电子科技大学 | There is in intelligent grid electricity statistics and the charging method of secret protection |
-
2016
- 2016-11-04 CN CN201610972257.2A patent/CN106549767A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050184882A1 (en) * | 2004-02-19 | 2005-08-25 | Bruce Angelis | Utility endpoint communication scheme, such as for sequencing the order of meter reading communications for electric, gas, and water utility meters |
CN102882688A (en) * | 2012-10-24 | 2013-01-16 | 北京邮电大学 | Lightweight authentication and key agreement protocol applicable to electric information acquisition |
CN103490880B (en) * | 2013-10-07 | 2016-04-13 | 西安电子科技大学 | There is in intelligent grid electricity statistics and the charging method of secret protection |
CN103763094A (en) * | 2014-01-03 | 2014-04-30 | 沈阳中科博微自动化技术有限公司 | Intelligent electric meter system safety monitoring information processing method |
CN104219056A (en) * | 2014-09-16 | 2014-12-17 | 西安电子科技大学 | Privacy protection type real-time electric charge collecting method for intelligent power grid |
Non-Patent Citations (2)
Title |
---|
S.SUBRAMANIAM等: "Online outlier detection in sensor data using non-parametric models", 《PROCEEDINGS OF THE 32ND INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES》 * |
龚凡: "基于群签名的智能电网用电量统计及电费的缴纳方案", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108964894A (en) * | 2018-06-28 | 2018-12-07 | 上海电力学院 | A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection |
CN108964894B (en) * | 2018-06-28 | 2021-04-30 | 上海电力学院 | Power grid electricity stealing detection method based on state estimation and with privacy protection |
CN109510830A (en) * | 2018-11-22 | 2019-03-22 | 南方电网科学研究院有限责任公司 | A kind of authentication method of intelligent electric meter, device, medium and equipment |
CN109510830B (en) * | 2018-11-22 | 2021-01-29 | 南方电网科学研究院有限责任公司 | Authentication method, device, medium and equipment for intelligent electric meter |
CN109600233A (en) * | 2019-01-15 | 2019-04-09 | 西安电子科技大学 | Group ranking mark based on SM2 Digital Signature Algorithm signs and issues method |
CN109600233B (en) * | 2019-01-15 | 2021-06-08 | 西安电子科技大学 | Group signature label issuing method based on SM2 digital signature algorithm |
CN110430050A (en) * | 2019-07-31 | 2019-11-08 | 湖南匡安网络技术有限公司 | A kind of smart grid collecting method based on secret protection |
CN112904067A (en) * | 2021-01-29 | 2021-06-04 | 桂林电子科技大学 | Real-time electricity stealing detection method based on user data privacy |
CN112904067B (en) * | 2021-01-29 | 2024-06-11 | 桂林电子科技大学 | Real-time electricity stealing detection method based on user data privacy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guan et al. | Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid | |
Ferrag et al. | A systematic review of data protection and privacy preservation schemes for smart grid communications | |
Bao et al. | A new differentially private data aggregation with fault tolerance for smart grid communications | |
Wang | An identity-based data aggregation protocol for the smart grid | |
Finster et al. | Privacy-aware smart metering: A survey | |
Finster et al. | Privacy-aware smart metering: A survey | |
Lu et al. | EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications | |
Li et al. | Secure and privacy-preserving information aggregation for smart grids | |
Ferrag et al. | A survey on privacy-preserving schemes for smart grid communications | |
CN106549767A (en) | A kind of data authentication with secret protection and tracing system | |
Stegelmann et al. | Gridpriv: A smart metering architecture offering k-anonymity | |
Li et al. | A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid | |
Liu et al. | An anonymous data aggregation scheme for smart grid systems | |
Lu et al. | A novel privacy-preserving set aggregation scheme for smart grid communications | |
Chu et al. | Privacy-preserving smart metering with regional statistics and personal enquiry services | |
Lu | Privacy-enhancing aggregation techniques for smart grid communications | |
Finster et al. | Elderberry: A peer-to-peer, privacy-aware smart metering protocol | |
CN113901412A (en) | Power quality disturbance detection method and device, electronic equipment and storage medium | |
Karopoulos et al. | MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem | |
Zhang et al. | Enabling verifiable privacy-preserving multi-type data aggregation in smart grids | |
Zhang et al. | Key-leakage resilient encrypted data aggregation with lightweight verification in fog-assisted smart grids | |
Bao et al. | Bbnp: a blockchain-based novel paradigm for fair and secure smart grid communications | |
Zhang et al. | SP2DAS: self-certified PKC-based privacy-preserving data aggregation scheme in smart grid | |
Wen et al. | ECQ: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid | |
Wen et al. | A data aggregation scheme with fine-grained access control for the smart grid |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170329 |
|
RJ01 | Rejection of invention patent application after publication |