PRIVACY-PRESERVING SMART METERING WITHOUT A TRUSTED-THIRD-PARTY

被引:0
作者
Jeske, Tobias [1 ]
机构
[1] Tech Univ Hamburg, Inst Secur Distributed Applicat, D-21079 Hamburg, Germany
来源
SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2011年
关键词
Smart metering; Smart grid; Cryptography; Zero-knowledge protocols; Privacy; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart meters report the current electricity consumption over the internet back to their energy providers. Finely-sampled power consumption enables the energy provider to learn the habits of the customer's household in which the smart meter is installed. This paper presents a protocol which preserves customer privacy but also allows the detection of unregistered smart meters and prevents spamming and replay attacks. A trusted-third-party is not needed. This protocol, whose security proof relies on the strong RSA assumption and the random oracle model, is based on zero-knowledge techniques. The protocol has been implemented on different hardware platforms and benchmark results are given.
引用
收藏
页码:114 / 123
页数:10
相关论文
共 19 条
[1]  
[Anonymous], 260 I THEOR COMP SCI
[2]  
Berg Insight, 2010, WORLDWIDE INSTALLED
[3]  
Camenisch J, 2005, LECT NOTES COMPUT SC, V3352, P120
[4]  
Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268
[5]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[6]  
Garcia F. D., 2010, LECT NOTES COMPUTER
[7]  
German Federal Ministry of Justice, 2008, ERN EN GES
[8]  
German Federal Ministry of Justice, 2005, GES EL GASV EN ENWG
[9]  
Gladman B., 2010, MPIR MULTIPLE PRECIS
[10]  
Groth J, 2005, LECT NOTES COMPUT SC, V3531, P467