Demand Response Transaction Framework Based on Blockchain and Secure Multi-party Computation

被引:0
|
作者
Li, Lei [1 ]
Lv, Ting [2 ]
Zhang, Zhi [1 ,2 ]
Zhou, Ziqiang
Yao, Ying [1 ]
Yan, Yong [1 ]
Wang, Yunchu [3 ]
Lin, Zhenzhi [3 ]
机构
[1] State Grid Zhejiang Elect Power Co, Hangzhou, Peoples R China
[2] Zhejiang Univ, Sch Elect Engn, Hangzhou, Peoples R China
[3] Zhejiang Univ, Coll Elect Engn, Hangzhou, Peoples R China
关键词
demand response; data mutual trus; blockchain; secure multi-party computation; secret sharing;
D O I
10.1109/AEEES56888.2023.10114253
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the development of system-level demand response transactions, diversified demand side resources are participating in the interaction with the power grid, which intensifies the problem of data mutual trust between power grid companies and users. In this regard, the potential data trust problems in the process of DR market clearing and load reduction calculation are analyzed, including data leakage and data abuse. Then, a DR transaction framework based on blockchain is proposed with secret sharing based secure multi-party computation adopted. For user different quotation modes, additive secret sharing algorithm is introduced for DR market clearing, and polynomial interpolation-based secret sharing algorithm is adopted for the trusted calculation of user load reduction. Under the proposed DR transaction framework based on blockchain and secure multi-party computation, data mutual trust problems between power grid companies and users can be properly solved.
引用
收藏
页码:1401 / 1406
页数:6
相关论文
共 50 条
  • [41] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
    Gupta, Debayan
    Segal, Aaron
    Panda, Aurojit
    Segev, Gil
    Schapira, Michael
    Feigenbaum, Joan
    Rexford, Jenifer
    Shenker, Scott
    PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
  • [42] Secure Multi-Party Computation Based on Cut-and-Choose Technology
    Zhao C.
    Xu J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1800 - 1818
  • [43] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation
    Mou, Wenhao
    Fu, Chunlei
    Lei, Yan
    Hu, Chunqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209
  • [44] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS
    Kosolapov, Yu. V.
    BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
  • [45] Minimal Complete Primitives for Secure Multi-Party Computation
    Matthias Fitzi
    Juan A. Garay
    Ueli Maurer
    Rafail Ostrovsky
    Journal of Cryptology, 2005, 18 : 37 - 61
  • [46] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [47] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
  • [48] Rational protocol of quantum secure multi-party computation
    Zhao Dou
    Gang Xu
    Xiu-Bo Chen
    Xin-Xin Niu
    Yi-Xian Yang
    Quantum Information Processing, 2018, 17
  • [49] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    Science China Information Sciences, 2011, 54 : 1654 - 1662
  • [50] Round-Optimal Secure Multi-party Computation
    Shai Halevi
    Carmit Hazay
    Antigoni Polychroniadou
    Muthuramakrishnan Venkitasubramaniam
    Journal of Cryptology, 2021, 34