CN106549767A - A kind of data authentication with secret protection and tracing system - Google Patents

A kind of data authentication with secret protection and tracing system Download PDF

Info

Publication number
CN106549767A
CN106549767A CN201610972257.2A CN201610972257A CN106549767A CN 106549767 A CN106549767 A CN 106549767A CN 201610972257 A CN201610972257 A CN 201610972257A CN 106549767 A CN106549767 A CN 106549767A
Authority
CN
China
Prior art keywords
data
user
sent
control centre
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610972257.2A
Other languages
Chinese (zh)
Inventor
温蜜
张栩
孙旭
雷景生
顾春华
张瑞
张玉鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University of Electric Power
University of Shanghai for Science and Technology
Original Assignee
Shanghai University of Electric Power
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University of Electric Power filed Critical Shanghai University of Electric Power
Priority to CN201610972257.2A priority Critical patent/CN106549767A/en
Publication of CN106549767A publication Critical patent/CN106549767A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of data authentication with secret protection and tracing system, including:Data collecting point, for collecting the detail data of checking user power utilization, is analyzed according to the data for counting on, and analysis result is sent to control centre, if pinpointing the problems data, its data and signing messages are sent to control centre in the lump;Control centre, for the analysis result that receiving data bleeding point sends, if receiving the signature of the problem data sent by data point, whether the associated key check problem data that trusted third party's offer can be first passed through are sent by same signer, trace the identity of the sender of problem data afterwards by trusted third party's application;Trusted third party, for being responsible for generating group's association key and managing user;Intelligent electric meter, for, after obtaining Third Party Authentication and possessing corresponding group cipher, sending corresponding electricity consumption data to control centre and correspondence user.Compared with prior art, the present invention has the advantages that safe.

Description

A kind of data authentication with secret protection and tracing system
Technical field
The present invention relates to a kind of data authentication and tracing system, more particularly, to it is a kind of for intelligent grid with privacy The data authentication and tracing system of protection.
Background technology
Intelligent grid, is also called knowledge type electrical network or modern power network, is by modern advanced sensing and e measurement technology, letter The novel power grid that message communication technology, control technology and original power transmission and distribution infrastructure are highly integrated and are formed.With traditional electricity Net is compared, and intelligent grid has the new features such as two-way communication, distribution type electric energy, dynamic price and load control.In order that intelligence The various intelligent Services that energy electrical network can be provided, need intelligent electric meter the real-time power information of user to be issued in power supply control The heart (sends a power information) such as per 15 minutes.But, the mistake of customer consumption data is reported on this high frequency ground to control centre Journey, may cause serious privacy leakage problem, this integrity just to user data transmission in intelligent grid, confidentiality, The problems such as attack tolerant and secret protection, proposes new challenge.
In recent years, for how to protect the privacy of user, related scholar to do substantial amounts of research.Sent out in intelligent electric meter in real time In sending data procedures, the privacy protecting technology of user can be roughly divided into physical technique, data aggregation technique and identity anonymous skill Art.
Physical technique mainly using energy storage device hiding the true consumption information of user, so as to reach the mesh of hiding privacy 's.Its cardinal principle is to change the user power utilization information read by intelligent electric meter by the discharge and recharge of energy storage device.By using Rechargeable battery protecting the electricity consumption privacy of user, for example:By battery rush/discharge with the use/unuse of household electrical appliance with 1/0 representing, maintains the balance of power is measured with intelligent electric meter by the discharge and recharge of rechargeable battery, if certain section of time household electric The power that the mean power of device is measured less than epimere time ammeter, then discharging rechargeable battery make its power with household electrical appliance and with The power that epimere time ammeter is measured is equal, and vice versa.Formulate rechargeable battery state policy and prove that its information is let out with experiment The speed ratio of dew is relatively low, is effectively protected the privacy of user.But the rechargeable battery in the technology is relative to other technologies original paper Costly, and the number of times of its life-span and discharge and recharge is limited.
It is one that Bohli proposes Utilities Electric Co. first for the electricity consumption data needed for monitoring operation of power networks and prediction electricity needs The real-time total electricity in individual region, and then propose in intelligent grid by data aggregation technique to protect privacy of user.With Afterwards, researchers have carried out correlational study to protection privacy of user using data aggregation technique.Wherein, have same by constructing one The method of state polymerization tree, protects the privacy of user.Most scholars construct its privacy using Paillier homomorphic cryptographies and protect Shield scheme, Integral Thought is:Individual user constitutes a polymeric unit, makes control centre have to the total of all user power utilization amounts With, and do not know the personal data of each user.Although above method protects individual subscriber privacy, but gathered data for polymerization State, it is impossible to for real-time detection and tracing individual problem ammeter.
Therefore, it is real-time for ammeter send data procedures in protect user privacy, identity anonymous technology in recent years also into For study hotspot.In identity anonymous technology, group ranking technology is a kind of digital signature encryption mode of extremely important specific form, It is proposed in 1991 by Chaum and Van Heyst.Group signature scheme generally includes a group manager and several groups Member, any member in group can represent group and anonymously be signed.Some scholars are proposed using based on Bilinear map Group ranking technical protection privacy of user, though the group signature scheme for proposing is than more efficient, for signature traces aspect, due to each The signature of signer is different, when causing inquiry, it is possible that same signer is repeatedly inquired about, wastes communication overhead.Therefore, Relatedness group ranking algorithm is suggested, the association person in the algorithm can utilize group ranking associated key is judged two it is different Group ranking be whether that same member produces in group, and do not reveal the information of group members, that is, still be able to ensure hideing for group members Name property.But do not illustrate how problem data is found.
The content of the invention
The purpose of the present invention is exactly to provide a kind of with secret protection to overcome the defect of above-mentioned prior art presence Data authentication and tracing system.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of data authentication with secret protection and tracing system, including:
Data collecting point, for collecting the detail data of checking user power utilization, is analyzed according to the data for counting on, and Analysis result is sent to into control centre, if pinpointing the problems data, its data and signing messages control centre is sent in the lump;
Control centre, for the data that receiving data bleeding point sends, if receiving the problem data sent by data point Whether signature, the associated key check problem data that can first pass through trusted third party's offer are sent by same signer, afterwards The identity of the sender of problem data is traced by trusted third party's application;
Trusted third party, is one while the mechanism trusted by user and control centre, generates faciation for responsible Close key and manage user, the intelligent electric meter of certification user simultaneously generates corresponding group cipher for which, and assist control centre to inquire about The identity of the sender of problem data;
Intelligent electric meter, for after obtaining Third Party Authentication and possessing corresponding group cipher, every setting time to control Center processed and correspondence user send corresponding electricity consumption data.
Described control centre provides a user with the service of electricity consumption, by analysis result, reasonably carries out energy scheduling.
Described trusted third party's input security parameter sets up customer group, and generates group master key, associated key and inquiry Key, wherein group's master key are used for certification user validation, and whether associated key is same signer for check problem data Sent, query key is used for the legitimacy of revene lookup request.
The ID of described user encryption oneself and corresponding ammeter numbering are sent to control centre's application for registration, control centre's note Record ID encode with corresponding ammeter, and ID is signed with private key and be sent to user, and user uses the signature to credible Third party proves its legitimacy, and applies into group.
After described trusted third party checking user enters group's application, corresponding group ranking key is calculated by ID.
Described intelligent electric meter encryption data and with group's master key to being sent to data collecting point after data signature.
Described data collecting point verifies received signature, and verifies the identity of sender, and authentication is into connecing immediately Receive the data.
The judge process of described problem data is as follows:
Distance-based outlier is defined, and data collecting point defines data M=(m1,…,mn) and kernel function kM(x), wherein, All values for M all meetArrange and define distribution equationWherein T is former data Sample, as collected data are constantly updated, the value principle of k (x) is:
Wherein, B is kernel function field width;Explained by above-mentioned definition, data collecting point calculates detection data and sample number According to space lengthR is setting query context, if N (M, r) less than defined domain D, then the data It is judged as problem data.
Compared with prior art, the present invention has advantages below:
1st, group ranking is combined by the present invention with data technique is followed the trail of, different from conventional privacy tracing scheme, in we The detection process of problem data is explained in case, has described how to judge whether a data are problem data in detail.
2nd, the function with secret protection, is effectively protected to transmission data, and malicious attacker receives user The data transmitted can also not recover the true ID of user.
3rd, autgmentability is high, if new user adds, it is only necessary to by closing to control centre and trusted third party respectively Method application, obtains signature key.
4th, communication and computing cost are reduced, compared with traditional group's encipherment scheme, this programme increases group ranking relatedness Function, it may be verified that whether multiple signatures are the amount of tracing (communication overhead) that problem data is reduced carried out by same signer, effectively Quick search problem user identity.Meanwhile, traditional group's encipherment scheme is compared, and decreases computing cost.
5th, safe, due to the zero knowledge proof in group ranking technology, the identity for being effectively guaranteed validated user is tested Card, and malicious attacker cannot forge a signature.
Description of the drawings
Fig. 1 is user data transmission figure of the present invention.
Specific embodiment
The present invention is described in detail with specific embodiment below in conjunction with the accompanying drawings.The present embodiment is with technical solution of the present invention Premised on implemented, give detailed embodiment and specific operating process, but protection scope of the present invention be not limited to Following embodiments.
A kind of data authentication with secret protection and tracing system, the system mainly include 5 entities:Data collecting point (Collector), control centre (Control Center), trusted third party (TTP), intelligent electric meter (SM), user (User). Wherein data collecting point collects the detail data of checking user power utilization, is analyzed according to the data for counting on, and analysis is tied Fruit is sent to control centre.If going wrong data, the data and signing messages are sent to into control centre;Control centre to User provides the service of electricity consumption, by analysis result, reasonably carries out energy scheduling.
If receiving the problem data of data collecting point transmission, the associated key inspection that can first pass through trusted third party's offer is asked Whether topic data are sent by same signer, are reduced and the traffic of trusted third party, backward trusted third party apply chasing after Look into the identity of the sender of problem data;Trusted third party be one while the mechanism trusted by user and control centre, it It is responsible for generating group's association key and managing user, the intelligent electric meter of certification user simultaneously generates corresponding group cipher for which.Meanwhile, also Control centre can be assisted to inquire about the identity of the sender of problem data;Intelligent electric meter is obtaining Third Party Authentication and is possessing corresponding group After key, sent corresponding electricity consumption data will to control centre and correspondence user every 15 minutes.
Fig. 1 show user data transmission figure, by taking one of user A data transfers as an example, binding model scheme Schematic diagram is described in detail to the method:
The first step:System initialization
A. trusted third party TTP is input into security parameter (1λ) set up group Ω1.If identity information ID and message M can distinguish table It is shown as the binary string of k positions and n positions.G is a tradable multiplicative group, N=p1p2p3, Bilinear map e:G×G→GT,It is One subgroup of group G, rank is p1, random selection generation unit g,VectorTo agreeing Promise ID=(x1,…,xk)←{0,1}k;VectorCorrespondence commitment message M=(m1,…,mn)←{0,1 }n.H is hash function.Random selection number w, h, l ← G, α ← ZN, L ← ZP, calculate f=wL.Generate group master key MK1=gα, close Connection key LK1=L, query key TK1=l.Announce common parameter:gpk1=(N, g, u, u1,…,uk,v,v1,…,vn,f,w, H, A=e (g, g)α,H).Wherein, associated key LK1It is sent to control centre.
A. user A encrypts the ID of oneselfAAnd corresponding ammeter numbering SMAIt is sent to control centre's application for registration (encrypted form:PKAFor the public key of user A).Control centre records IDASM is encoded with corresponding ammeterA, and with private key pair IDASignature (signature form:SKCCFor control centre's private key) and it is sent to user.User using the signature to Trusted third party proves its legitimacy, and applies into group.
B. after trusted third party's checking user enters group's application, by IDACalculate corresponding group ranking key.Select with Machine number r1←ZN, bi←ZP, calculateFrom groupTwo prime numbers R and R' are selected, the signature group cipher of application user is calculated KID={ K1,K2,Calculate the correlation for generating the proof based on non-interactive type Zero Knowledge ParameterMeanwhile, trusted third party calculates E=H (C)TK, and record < IDui,r1, C, E >, by (KID,C,Bi) It is sent to relative users A ammeter.
Second step:Electric power data is counted
A. intelligent electric meter encryption data use group cipher KIDTo data MASignature:Intelligent electric meter selects random number s, r2←ZN, Calculate:H1=H (C), H2=H (MA),S=(S1,S2,S3)=(K1C's,K2 -1,g-s).Wherein, meet non-friendship Mutually product equation is matched in zero-knowledge proof:e(S1,g)e(S2,C)e(S3, C') and=A.Select random number t1,t2,t3←ZN, t is Timestamp, calculates:T4=Cht,Select Random number θ ← Zp, calculate Q=w, c=Bif.Obtain signature sigmaA=(T1,T2,T3,T4,π,Q,c,H1), last intelligent electric meter will (MAA,H2) it is sent to data collecting point.
B. data collecting point checking is signed, collects data:Data collecting point verifies received signature, that is, check T4= Cht, calculate checking H3=H (MA) whether with the H for receiving2It is equal.Prove that data are not tampered with if by above-mentioned checking.Then The identity of checking sender, calculatesAnd substitute into equation e (T1,g)e(T2,T4)e(T3,T5)=Ae (h, π), checking is No establishment.If so, then sender is its group members, and data collecting point receives the data.
3rd step:Data collecting point analytical data
Distance-based outlier is defined, and data collecting point defines data MA=(m1,…,mn) and kernel function kM(x), wherein, For MAAll values all meetArrange and define distribution equationWherein T is former data Sample, as collected data are constantly updated.The value principle of k (x) is:
Wherein, B is kernel function field width.Explained by above-mentioned definition, data collecting point calculates detection data and sample number According to space lengthR is ad hoc inquiry scope.If N is (MA, r) less than defined domain D, then the number It is judged that being abnormal data.Data collecting point is sent to control centre the signing messages data associated therewith.
4th step:Data is activation person follows the trail of in control centre
A. in order to be able to reduce the inquiry number of times to user real-name query person, the sender of the abnormal ammeter of effective quick search Using associated key LK, identity, control centre verify whether multiple data signatures are signed by same ammeter.Control centre will calculate Relating value VL=e (c, h) e (Q, the h of each signatureLK)-1
If user A is bad data sender, and sends multiple untrue data (MA1,……,MAn), then its relating valueFor the relating value VL calculated by the signature that user A sendsAAll it is same value.Control As long as center is sent to one user A of trusted third party and signs inquiry request, it is to avoid the identity of repeat queries user A.
B. trusted third party receives the inquiry request of control centre and the signature sigma of corresponding dataA, query key TK is used, is counted CalculateAccording to log before, the ID of corresponding user A is searchedAAfterwards, Query Result is sent to into control centre.Control Center processed receives Query Result, and takes corresponding measure.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain of requirement is defined.

Claims (8)

1. a kind of data authentication with secret protection and tracing system, it is characterised in that include:
Data collecting point, for collecting the detail data of checking user power utilization, is analyzed according to the data for counting on, and will divide Analysis result is sent to control centre, if pinpointing the problems data, its data and signing messages is sent to control centre in the lump;
Control centre, for the data that receiving data bleeding point sends, if receiving the signature of the problem data sent by data point, Whether the associated key check problem data that trusted third party's offer can be first passed through are sent by same signer, afterwards by can The identity of the sender of problem data is traced in letter third party's application;
Trusted third party, is one while the mechanism trusted by user and control centre, closes close for being responsible for generation faciation Key simultaneously manages user, and the intelligent electric meter of certification user simultaneously generates corresponding group cipher for which, and assist control centre's inquiry problem The identity of the sender of data;
Intelligent electric meter, for after obtaining Third Party Authentication and possessing corresponding group cipher, every setting time in control The heart and correspondence user send corresponding electricity consumption data.
2. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described Control centre provide a user with the service of electricity consumption, by analysis result, reasonably carry out energy scheduling.
3. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described Trusted third party's input security parameter set up customer group, and generate group master key, associated key and query key, wherein group master Key is used for certification user validation, and whether associated key is sent by same signer for check problem data, inquires about close Key is used for the legitimacy of revene lookup request.
4. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described User encryption oneself ID and corresponding ammeter numbering be sent to control centre's application for registration, control centre's record ID and phase Answer ammeter to encode, and ID is signed with private key and be sent to user, user proves it to trusted third party using the signature Legitimacy, and apply into group.
5. a kind of data authentication with secret protection according to claim 4 and tracing system, it is characterised in that described Trusted third party checking user enter group application after, corresponding group ranking key is calculated by ID.
6. a kind of data authentication with secret protection according to claim 3 and tracing system, it is characterised in that described Intelligent electric meter encryption data and with group's master key to being sent to data collecting point after data signature.
7. a kind of data authentication with secret protection according to claim 4 and tracing system, it is characterised in that described Data collecting point verify received signature, and verify the identity of sender, authentication is into receiving the data immediately.
8. a kind of data authentication with secret protection according to claim 1 and tracing system, it is characterised in that described Problem data judge process it is as follows:
Distance-based outlier is defined, and data collecting point defines data M=(m1,…,mn) and kernel function kM(x), wherein, for M All values all meetArrange and define distribution equationWherein T is former data sample, As collected data are constantly updated, the value principle of k (x) is:
Wherein, B is kernel function field width;Explained by above-mentioned definition, data collecting point calculates detection data with sample data Space lengthR is setting query context, if (M, r) less than defined domain D, then the data judge N For problem data.
CN201610972257.2A 2016-11-04 2016-11-04 A kind of data authentication with secret protection and tracing system Pending CN106549767A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610972257.2A CN106549767A (en) 2016-11-04 2016-11-04 A kind of data authentication with secret protection and tracing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610972257.2A CN106549767A (en) 2016-11-04 2016-11-04 A kind of data authentication with secret protection and tracing system

Publications (1)

Publication Number Publication Date
CN106549767A true CN106549767A (en) 2017-03-29

Family

ID=58395437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610972257.2A Pending CN106549767A (en) 2016-11-04 2016-11-04 A kind of data authentication with secret protection and tracing system

Country Status (1)

Country Link
CN (1) CN106549767A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964894A (en) * 2018-06-28 2018-12-07 上海电力学院 A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection
CN109510830A (en) * 2018-11-22 2019-03-22 南方电网科学研究院有限责任公司 A kind of authentication method of intelligent electric meter, device, medium and equipment
CN109600233A (en) * 2019-01-15 2019-04-09 西安电子科技大学 Group ranking mark based on SM2 Digital Signature Algorithm signs and issues method
CN110430050A (en) * 2019-07-31 2019-11-08 湖南匡安网络技术有限公司 A kind of smart grid collecting method based on secret protection
CN112904067A (en) * 2021-01-29 2021-06-04 桂林电子科技大学 Real-time electricity stealing detection method based on user data privacy

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050184882A1 (en) * 2004-02-19 2005-08-25 Bruce Angelis Utility endpoint communication scheme, such as for sequencing the order of meter reading communications for electric, gas, and water utility meters
CN102882688A (en) * 2012-10-24 2013-01-16 北京邮电大学 Lightweight authentication and key agreement protocol applicable to electric information acquisition
CN103763094A (en) * 2014-01-03 2014-04-30 沈阳中科博微自动化技术有限公司 Intelligent electric meter system safety monitoring information processing method
CN104219056A (en) * 2014-09-16 2014-12-17 西安电子科技大学 Privacy protection type real-time electric charge collecting method for intelligent power grid
CN103490880B (en) * 2013-10-07 2016-04-13 西安电子科技大学 There is in intelligent grid electricity statistics and the charging method of secret protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050184882A1 (en) * 2004-02-19 2005-08-25 Bruce Angelis Utility endpoint communication scheme, such as for sequencing the order of meter reading communications for electric, gas, and water utility meters
CN102882688A (en) * 2012-10-24 2013-01-16 北京邮电大学 Lightweight authentication and key agreement protocol applicable to electric information acquisition
CN103490880B (en) * 2013-10-07 2016-04-13 西安电子科技大学 There is in intelligent grid electricity statistics and the charging method of secret protection
CN103763094A (en) * 2014-01-03 2014-04-30 沈阳中科博微自动化技术有限公司 Intelligent electric meter system safety monitoring information processing method
CN104219056A (en) * 2014-09-16 2014-12-17 西安电子科技大学 Privacy protection type real-time electric charge collecting method for intelligent power grid

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
S.SUBRAMANIAM等: "Online outlier detection in sensor data using non-parametric models", 《PROCEEDINGS OF THE 32ND INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES》 *
龚凡: "基于群签名的智能电网用电量统计及电费的缴纳方案", 《中国优秀硕士学位论文全文数据库 工程科技Ⅱ辑》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964894A (en) * 2018-06-28 2018-12-07 上海电力学院 A kind of based on state estimation and have the power grid stealing electricity detection method of secret protection
CN108964894B (en) * 2018-06-28 2021-04-30 上海电力学院 Power grid electricity stealing detection method based on state estimation and with privacy protection
CN109510830A (en) * 2018-11-22 2019-03-22 南方电网科学研究院有限责任公司 A kind of authentication method of intelligent electric meter, device, medium and equipment
CN109510830B (en) * 2018-11-22 2021-01-29 南方电网科学研究院有限责任公司 Authentication method, device, medium and equipment for intelligent electric meter
CN109600233A (en) * 2019-01-15 2019-04-09 西安电子科技大学 Group ranking mark based on SM2 Digital Signature Algorithm signs and issues method
CN109600233B (en) * 2019-01-15 2021-06-08 西安电子科技大学 Group signature label issuing method based on SM2 digital signature algorithm
CN110430050A (en) * 2019-07-31 2019-11-08 湖南匡安网络技术有限公司 A kind of smart grid collecting method based on secret protection
CN112904067A (en) * 2021-01-29 2021-06-04 桂林电子科技大学 Real-time electricity stealing detection method based on user data privacy
CN112904067B (en) * 2021-01-29 2024-06-11 桂林电子科技大学 Real-time electricity stealing detection method based on user data privacy

Similar Documents

Publication Publication Date Title
Guan et al. Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid
Ferrag et al. A systematic review of data protection and privacy preservation schemes for smart grid communications
Bao et al. A new differentially private data aggregation with fault tolerance for smart grid communications
Wang An identity-based data aggregation protocol for the smart grid
Finster et al. Privacy-aware smart metering: A survey
Finster et al. Privacy-aware smart metering: A survey
Lu et al. EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
Li et al. Secure and privacy-preserving information aggregation for smart grids
Ferrag et al. A survey on privacy-preserving schemes for smart grid communications
CN106549767A (en) A kind of data authentication with secret protection and tracing system
Stegelmann et al. Gridpriv: A smart metering architecture offering k-anonymity
Li et al. A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid
Liu et al. An anonymous data aggregation scheme for smart grid systems
Lu et al. A novel privacy-preserving set aggregation scheme for smart grid communications
Chu et al. Privacy-preserving smart metering with regional statistics and personal enquiry services
Lu Privacy-enhancing aggregation techniques for smart grid communications
Finster et al. Elderberry: A peer-to-peer, privacy-aware smart metering protocol
CN113901412A (en) Power quality disturbance detection method and device, electronic equipment and storage medium
Karopoulos et al. MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
Zhang et al. Enabling verifiable privacy-preserving multi-type data aggregation in smart grids
Zhang et al. Key-leakage resilient encrypted data aggregation with lightweight verification in fog-assisted smart grids
Bao et al. Bbnp: a blockchain-based novel paradigm for fair and secure smart grid communications
Zhang et al. SP2DAS: self-certified PKC-based privacy-preserving data aggregation scheme in smart grid
Wen et al. ECQ: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid
Wen et al. A data aggregation scheme with fine-grained access control for the smart grid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170329

RJ01 Rejection of invention patent application after publication