Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids

被引:8
|
作者
Lin, Chao [1 ,2 ]
He, Debiao [2 ]
Zhang, Hongjie [3 ]
Shao, Lisong [4 ]
Huang, Xinyi [4 ]
机构
[1] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350007, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] State Grid Ningxia Elect Power Co Ltd, Yinchuan 750001, Ningxia, Peoples R China
[4] State Grid Elect Power Res Inst, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金;
关键词
SM2 digital signature; set membership; range proofs; decentralized anonymous credential; smart grid; SECURITY; KNOWLEDGE; PROTOCOLS; SCHEME; PROOFS;
D O I
10.1016/j.csi.2020.103505
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Decentralized Anonymous Credential (DAC) has posed enormous potential in smart grids for protecting user privacy (e.g. preventing user's daily life from being sketched out). However, the existing DAC protocols still compromise user privacy for a full list of attributes are disclosed during showing credentials. In this paper, to construct a privacy-enhancing decentralized anonymous credential (PEDAC) protocol, we first design a more efficient range proof to hide user's attributes. Specifically, we are inspired by Camenisch et al. (ASIACRYPT 2008), but replace their adopted Boneh-Boyen signature scheme with the Chinese standard 5M2 signature scheme (incorporated in the ISO/IEC 14888-3) to propose pairing-free set membership and range proof protocols. These protocols can be executed non-interactively upon the Fiat-Shamir heuristic (INDOCRYPT 2012), and then be used to construct our PEDAC protocol. By compared with the protocols of Camenisch et al. (ASIACRYPT 2008) and Poelstra et al. (FC 2018), our proposed range proofs are with less communication and computation costs and hence more practical for constructing PEDAC protocols in smart grids.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] PRIVACY-ENHANCING APPLIANCE FILTERING FOR SMART METERS
    Avula, Ramana R.
    Oechtering, Tobias J.
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 9042 - 9046
  • [2] User Preferences of Privacy-Enhancing Attributes of a Smart Speaker
    Choi, Hanbyul
    Park, Jonghwa
    Choi, Young Rok
    Jung, Yoonhyuk
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2023, 39 (18) : 3649 - 3662
  • [3] A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
    Wachs, Matthias
    Schanzenbach, Martin
    Grothoff, Christian
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 127 - 142
  • [4] Multi-resolution privacy-enhancing technologies for smart metering
    Knirsch F.
    Eibl G.
    Engel D.
    [J]. EURASIP Journal on Information Security, 2017 (1)
  • [5] Privacy-enhancing technologies
    Senicar, V
    Klobucar, T
    Jerman-Blazic, B
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 213 - 227
  • [6] A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential
    Diao, Feng
    Zhang, Fangguo
    Cheng, Xiangguo
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (01) : 461 - 467
  • [7] Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials
    Derler, David
    Hanser, Christian
    Slamanig, Daniel
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 49 - 65
  • [8] Privacy-enhancing technologies in the design of digital twins for smart cities
    Ahmadi-Assalemi, Gabriela
    Al-Khateeb, Haider
    Aggoun, Amar
    [J]. Network Security, 2022, 2022 (07)
  • [9] On the Adoption of Privacy-enhancing Technologies
    Caulfield, Tristan
    Ioannidis, Christos
    Pym, David
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 175 - 194
  • [10] Privacy-Enhancing Overlays in Bitcoin
    Meiklejohn, Sarah
    Orlandi, Claudio
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8976 : 127 - 141