[1]GELLINGS C W. The smart grid: enabling energy efficiency and demand response[M]. Lilburn GA: Fairmont Press, 2009.[2]路保辉,马永红.智能电网AMI 通信系统及其数据安全策略研究[J].电网技术,2013, 37(8): 22442249.[3]厦门毅仁信息技术有限公司.智能小区水表、电表、气表、热力表能耗计量远程集中抄表系统[R/OL].(20140323)[20150601].http://www.gongkong.com/webpage/news/201403/2014032309333700001.htm[4]田秀霞,高明,王晓玲,等.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):9911006.[5]FOUDA M M, FADLULLAH Z M, KATO N, et al. A lightweight message authentication scheme for smart grid communications[J]. IEEE Transactions on Smart Grid, 2011, 2(4): 675685.[6]FOUDA M M, FADLULLAH Z M, KATO N, et al. Towards a lightweight message authentication mechanism tailored for smart grid communications[C]//Proceedings of the IEEE International Conferrance on Information Networking. Shanghai, 2011: 10181023.[7]ELISA B, KENJI T. Identity management concepts, technologies, and systems[M]. Boston: Artech House, 2011.[8]刘薇.智能电能表数据安全防护技术探讨[J].电源技术应用,2013(6):404.[9]王耀辉,金海燕,朱莉. 基于用户隐私保护的智能电表设计[J].黑龙江科技信息,2014(7):7375.[10]春波绿影.电力线载波自动抄表系统智能电表之自动抄表主流方案盘点[R/OL].(20130128)[20150601].http://www.elecfans.com/dianyuan/306612_4.html[11]LI F, LUO B, LIU P. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption[C]//Proceedings of the 1st IEEE International Conference on Smart Grid Communication. Gaithersburg, MD, 2010: 327332.[12]CHEUNG J C L, CHIM T W, YIU S M, et al. Credentialbased privacypreserving power request scheme for smart grid network[C]//Proceedings of the IEEE Global Telecommunications Conference. Houston, 2011: 15.[13]CHAUMM D. Blind signatures for untraceable payments[C]//Proceedings of CRYPTO′82 Conference on Advances in Cryptology. California USA: Springer Berlin Heidelberg, 1982: 199203.[14]YU C M, CHEN C Y, KUO S Y, et al. Privacypreserving power request in smart grid networks [J]. IEEE Systems Journal, 2014, 8(2): 441449.[15]LIN X, LU R, ZHU H, et al. ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks[C]//Proceedings of the IEEE ICC. Glasgow, 2007: 12471253.[16]CHIM T W, YIU S M, LUCAS C K, et al. PASS: Privacypreserving authentication scheme for smart grid network[C]//Proceedings of the IEEE International Conference on Smart Grid Communications. Brussels, 2011: 196201.[17]CHIM T W, YIU S M, HUI L C K, et al. PRGA: Privacypreserving recording & gatewayassisted authentication of power usage information for smart Grid[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 12(1): 8597.[18]KALISKI B, STADDON J. RSA Cryptography Specifications Version 2.0[M].[s.l]: The Internet Society, 1998. [19]LEE S, BONG J, SHIN S, et al. A security mechanism of smart grid AMI network through smart device mutual authentication[C]//Proceedings of 2014 IEEE International Conference on Information Networking. Phuket, 2014: 592595.[20]EFTHMIOU C, KALOGRIDIS G. Smart grid privacy via anonymization of smart metering data[C]//Proceedings of the 1st IEEE International Conference on Smart Grid Communications. Gaithersburg, MD, 2010: 238243.[21]BELLARE M, GOLDREICH O. On defining proofs of knowledge[C]//Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer Berlin Heidelberg, 1992: 390420. [22]MARKHAM M M, SHENOY P, FU F, et al. Private memoirs of a smart meter[C]//Proceedings of the 2010 ACM BuildSys International Conference on Embedded Systems for EnergyEfficient Buildings. Zurich: ACM, 2010: 6166.[23]RIAL A, DANEZIS G. PrivacyPreserving Smart Metering[C]//Highlights of the Information Security Solutions Europe 2012 Conference. Europe: Springer Berlin Heidelberg, 2012: 105115.[24]SCHNORR C. Efficient signature generation for smart cards[J]. Journal of Cryptology, 1991, 4(3):239252.[25]CHAUM D, PEDERSEN T. Wallet databases with observers[C]//Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1993:89105.[26]OKAMOTO T. An efficient divisible electronic cash scheme[C]//Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1995: 438451.[27]BOOUDOT F. Efficient proofs that a committed number lies in an interval[C]//Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques. Bruges, Belgium: Springer Berlin Heidelberg, 2000: 431444.[28]CRAMER R, DAMGARD I, SCHOENMAKERS B. Proofs of partial knowledge and simplified design of witness hiding protocols[C]//Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1994: 174187.[29]FIAT A, SHAMIR A. How to prove yourself: Practical solutions to identification and signature problems[C]//Proceedings of the Advances in Cryptology. [s.l.]: Springer Berlin Heidelberg, 1987: 186194.[30]ERKIN Z, TRONCOSOPPASTORIZA J R, LAGENDIJK R L, et al. Privacypreserving data aggregation in smart metering systems: an overview[J]. IEEE Signal Processing Society, 2013, 30(2): 7586.[31]PAILLIER P. Publickey cryptosystems based on composite degree residuosity classes[C]//Proceedings of the 17th International Conference on Theory Application Cryptographic Techniques. Prague, Czech Republic: Springer Berlin Heidelberg, 1999: 223238.[32]ERKIN Z, TSUDIK G. Private computation of spatial and temporal power consumption with smart meters[C]//Proceedings of the International Conference on Applied Cryptography and Network Security. Singapore: Springer Berlin Heidelberg, 2012: 561577.[33]GARCIA F D, JACOBS B. Privacyfriendly energymetering via homomorphic encryption[C]//Proceedings of the 6th Workshop on Security and Trust Management. Athens, Greece: Springer Berlin Heidelberg, 2010: 226238. [34]KURSAWE K, DANEZIS G, KOHLWEISS M. Privacyfriendly aggregation for the smartgrid[C]//Proceedings of the 11th International Symposium on Privacy Enhancing Technologies. Waterloo, Canada: Springer Berlin Heidelberg, 2011: 175191.[35]CS G, CASTELLUCCIA C. I have a DREAM! (differentially private smart metering)[C]//Proceedings of the 13th international conference on Information hiding. [s.l.]: Springer Berlin Heidelberg, 2011: 118132.[36]DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis[C]//Proceedings of the 3rd Theory of Cryptography Conference. New York: Springer Berlin Heidelberg, 2006: 265284.[37]DWORK C. Differential privacy: A survey of results[C]//Proceedings of the 3rd International Conference on Theory and Applications of Models of Computation. Xi’an China: Springer Berlin Heidelberg, 2008: 119.[38]RASTAGI V, NATH S. Differentially private aggregation of distributed timeseries with transformation and encryption[C]//Proceedings of the 2010 ACM SIGMOD International Conference on Management of data. Indiana: ACM, 2010: 611.[39]VARODAYAN D. KHISTI A. Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage[C]//Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Prague: Czech Republic, 2011: 19321935.[40]KALOGRIDIS G, EFTHYMIOOU C, DENIC S, et al. Privacy for smart meters: towards undetectable appliance load signatures[C]//Proceedings of the IEEE International Conference on Smart Grid Communications. Gaithersburg, MD, 2010: 232237.[41]ARNOLD D M, LOELIGER H A, VONTOBEL P O, et al. Simulationbased computation of information rates for channels with memory[J]. IEEE Transactions on Information Theory, 2006, 52(8): 34983508.[42]TIAN X X, SHA C F, WANG X L, et al. Privacy preserving query processing on secret share based data storage[C]//Proceedings of the 16th International Conference on Database Systems for Advanced Applications(DASFAA 2011). Hong Kong China: LNCS6587, 2011: 108122.[43]任梦吟,毛琪琦,马婷,等.基于云计算的智能电表用户表单隐私保护.智能电网,2014(4): 123128.[44]国家电力公司称将在2015年建成全国统一的联合电网[J].中国石油和化工, 2001, (3):11.[45]TIAN X X, HUANG L, WANG Y, et al. DualAcE: finegrained dual access control enforcement with multiprivacy guarantee in DaaS[J]. Security and Communication Networks, 2014, 8(8): 14941508.[46]林稼弘.泓格发表新式智能型WebBased电表集中器[R/OL].(20140219)[20150601].http://gbwww.digitimes.com.tw/tw/iac/shwnws.asp?cat=10&cat1=10&cnlid=19&id=368253. |