• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Yangtong, Zhang Huang, Xie Shaohao, Zhang Fangguo. Post-Quantum Privacy Preserving Smart Metering System[J]. Journal of Computer Research and Development, 2019, 56(10): 2229-2242. DOI: 10.7544/issn1000-1239.2019.20190402
Citation: Tian Yangtong, Zhang Huang, Xie Shaohao, Zhang Fangguo. Post-Quantum Privacy Preserving Smart Metering System[J]. Journal of Computer Research and Development, 2019, 56(10): 2229-2242. DOI: 10.7544/issn1000-1239.2019.20190402

Post-Quantum Privacy Preserving Smart Metering System

More Information
  • Published Date: September 30, 2019
  • As the next generation of power system, smart grid allows power suppliers to collect data in high-frequency from consumers’ data to support energy consumption regulation, intelligent electricity distribution and energy management. However, fine-grained energy related data also introduces challenges in security and privacy. How to protect consumer privacy has become a key issue in smart grid research. Currently, quantum computing science is developing rapidly.Lattice-based cryptography is one of the most promising families of candidates to the quantum-resistantwork. Concerning about the privacy protection inthe process of uploading real-time data from user meters to cell concentrators in the three-level model of smart grid, in this paper, we use lattice-based linkable ring signature to construct a quantum-resistant smart meter data acquisition scheme to protect user privacy. We choose an advanced short lattice-based ring signature scheme, which is built on the top of one-out-of-many proof with sub-linear size, and we add linkability to it in order to provide anomalous user monitoring and tracking functions for the quantum-resistant privacy preserving system. With a post-quantum signature scheme, our system supports dynamic user to join and revoke, and has better flexibility and practicability. The security proof and performance analysis of the system are carried out to show its effectiveness and feasibility.
  • Related Articles

    [1]Cui Chaoyuan, Li Yonggang, Wu Yun, Wang Licheng. A Memory Forensic Method Based on Hidden Event Trigger Mechanism[J]. Journal of Computer Research and Development, 2018, 55(10): 2278-2290. DOI: 10.7544/issn1000-1239.2018.20180405
    [2]Yi Peng, Zhou Qiao, Men Haosong. Dynamic Social Network Community Detection Algorithm Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2017, 54(11): 2611-2619. DOI: 10.7544/issn1000-1239.2017.20160741
    [3]Tang Wanning, Wang Mingwen, Wan Jianyi. Markov Network Retrieval Model Based on Document Cliques[J]. Journal of Computer Research and Development, 2014, 51(10): 2248-2254. DOI: 10.7544/issn1000-1239.2014.20130343
    [4]Jiang Changhao, Zhang Min, Gao Bin, Liu Yiqun, Ma Shaoping. Advertiser Status Modeling in Sponsored Search[J]. Journal of Computer Research and Development, 2013, 50(12): 2621-2628.
    [5]Wu Caihua, Liu Juntao, Peng Shirui, Li Haihong. Deriving Markov Chain Usage Model from UML Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1811-1819.
    [6]Zhang Zhan, Liu Guangjie, Dai Yuewei, Wang Zhiquan. A Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1668-1675.
    [7]Dong Hao, Liu Yuanning, Zhang Hao, Wang Gang. A Method of RNA Secondary Structure Prediction Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2012, 49(4): 812-817.
    [8]Zhao Jing, Huang Houkuan, and Tian Shengfeng. Protocol Anomaly Detection Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2010, 47(4): 621-627.
    [9]Wang Junwen, Liu Guangjie, Dai Yuewei, Zhang Zhan, and Wang Zhiquan. Image Forensics for Blur Detection Based on Nonsubsampled Contourlet Transform[J]. Journal of Computer Research and Development, 2009, 46(9): 1549-1555.
    [10]Duan Jiangjiao, Xue Yongsheng, Lin Ziyu, Wang Wei, Shi Baile. A Novel Hidden Markov Model-Based Hierarchical Time-Series Clustering Algorithm[J]. Journal of Computer Research and Development, 2006, 43(1): 61-67.

Catalog

    Article views (1015) PDF downloads (655) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return