Demand Response Transaction Framework Based on Blockchain and Secure Multi-party Computation

被引:0
|
作者
Li, Lei [1 ]
Lv, Ting [2 ]
Zhang, Zhi [1 ,2 ]
Zhou, Ziqiang
Yao, Ying [1 ]
Yan, Yong [1 ]
Wang, Yunchu [3 ]
Lin, Zhenzhi [3 ]
机构
[1] State Grid Zhejiang Elect Power Co, Hangzhou, Peoples R China
[2] Zhejiang Univ, Sch Elect Engn, Hangzhou, Peoples R China
[3] Zhejiang Univ, Coll Elect Engn, Hangzhou, Peoples R China
关键词
demand response; data mutual trus; blockchain; secure multi-party computation; secret sharing;
D O I
10.1109/AEEES56888.2023.10114253
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of system-level demand response transactions, diversified demand side resources are participating in the interaction with the power grid, which intensifies the problem of data mutual trust between power grid companies and users. In this regard, the potential data trust problems in the process of DR market clearing and load reduction calculation are analyzed, including data leakage and data abuse. Then, a DR transaction framework based on blockchain is proposed with secret sharing based secure multi-party computation adopted. For user different quotation modes, additive secret sharing algorithm is introduced for DR market clearing, and polynomial interpolation-based secret sharing algorithm is adopted for the trusted calculation of user load reduction. Under the proposed DR transaction framework based on blockchain and secure multi-party computation, data mutual trust problems between power grid companies and users can be properly solved.
引用
收藏
页码:1401 / 1406
页数:6
相关论文
共 50 条
  • [21] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [22] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [23] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [24] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [25] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [26] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [27] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [28] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [29] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [30] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293