Selected Privacy-Preserving Protocols
This chapter presents four Privacy-Preserving Protocols (PPPs)—PPP1 to PPP4—based on Symmetric DC-Nets (SDC-Nets), Elliptic Curve Cryptography (ECC), Asymmetric DC-Nets (ADC-Nets), and quantum cryptography, respectively. Besides efficiency, security, and
- PDF / 859,934 Bytes
- 40 Pages / 439.36 x 666.15 pts Page_size
- 104 Downloads / 204 Views
Selected Privacy-Preserving Protocols
Abstract This chapter presents four Privacy-Preserving Protocols (PPPs)—PPP1 to PPP4—based on Symmetric DC-Nets (SDC-Nets), Elliptic Curve Cryptography (ECC), Asymmetric DC-Nets (ADC-Nets), and quantum cryptography, respectively. Besides efficiency, security, and privacy, the first protocol provides only the consolidated monetary value c$j while the second is designed only to provide billing based on dynamic pricing with verification of each bill b$i . The third gives us the property of the two first protocols. Indeed, it provides all properties required in Sect. 4.2, namely: consolidated consumption, billing based on dynamic pricing, verification of aggregation and billing, and computational efficiency. Although the last protocol only provides the consolidated consumption, it pioneers PPPs based on quantum mechanics, i.e., this work presents the first PPP based on quantum mechanics to smart grids. In addition, quantum cryptography is more promising than quantum computers, and today, we already can buy devices that provide quantum cryptography. Keywords Privacy-preserving protocols • Symmetric DC-Nets (SDC-Nets) • Elliptic curve cryptography • Asymmetric DC-nets (ADC-Nets) • Quantum cryptography • Verification • Efficiency
The four protocols presented in this chapter use a function to convert the measurements into monetary values. This function is important to simplify the protocols separating dynamic pricing from the security layer. Moreover, the security focus is to obtain the consolidated consumption in monetary value, i.e., consolidated monetary value. Therefore, the supplier can be abstracted as a counting agent and the protocols can be applied in other scenarios that require counting agents. Normally, the communication in the protocols for smart grid is described as Machine-toMachine (M2M). Differently, customers with their smart meters are addressed as users in this chapter.
© Springer International Publishing Switzerland 2017 F. Borges de Oliveira, On Privacy-Preserving Protocols for Smart Metering Systems, DOI 10.1007/978-3-319-40718-0_6
61
62
6 Selected Privacy-Preserving Protocols
6.1 Monetary Value The monetary value of a measurement mi;j is just the current price multiplied by the consumption. Nevertheless, the supplier has two prices: buying price pj and selling price pj . Hence, users buy with the selling price pj and sell with the buying price pj . The measurement mi;j might be measured in watts and can be positive for consumption and negative for generation. The signs can be inverted, but historically the consumption came first and it is given by a positive measurement. To transform a measurement to a monetary value, we can use the sign function. Note that .sgn.mi;j / 1/=2 returns 0 or 1 when mi;j is positive or negative, respectively. In contrast, .sgn.mi;j / C 1/=2 returns 1 or 0 when mi;j is positive or negative, respectively. We can use this observation to construct the function of monetary value given by let .sgn.mi;j /.mi;j /1/=2 .sgn.mi;
Data Loading...