期刊文献+

基于TCM的智能电表隐私保护协议 被引量:3

A protocol of privacy protection for smart meters based on TCM
下载PDF
导出
摘要 通过对智能电表向智能控制中心报告的实时电量消费数据的分析,可以得到用户的生活习惯和经济状况等隐私信息.在个人隐私日益受到关注的今天,用户隐私信息保护成为制约智能电网快速发展的重要因素之一.本文基于我国自主知识产权的可信密码模块,提出了具有隐私保护功能的智能电表实时用电量传输协议.使用环签名方案隐藏了用户身份,使用平台属性证书隐藏了智能电表平台配置,并在随机预言模型下证明协议的安全性.本协议研究不仅对智能电网隐私保护具有重要的理论意义,而且使可信计算技术具有一定的应用价值. Through the analysis of the real-time electricity consuming data from the smart meters sent to the intelligent control center, the user's private information such as personal habits and e- conomic state etc could be obtained. Nowadays, the personal privacy has received more and more attentions. The privacy protection is one of the most important factors to restrict the development of the smart grid. A smart meter real-time electricity transmission protocol is proposed based on the trusted cryptography module(TCM) with intellectual property rights. In this protocol, the ring signature is used to hide the user's identity and the platform attribute certificates are applied to hide the platform configurations of smart meters. The security of the protocol has been proved in the random predication model. This study has the significant references for the smart grid pri- vacy protection and also has good applications in trusted computing.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2016年第5期29-34,共6页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家自然科学基金青年科学基金资助项目(61502030) 北京高等学校青年英才计划项目资助(YETP0542) 中央高校基本科研业务费专项基金资助(2016JBM020)
关键词 可信计算 隐私保护 智能电网 可信密码模块 trusted computing privacy protection smart grid trusted cryptography module
  • 相关文献

参考文献2

二级参考文献13

  • 1国家密码管理局.可信计算密码支撑平台功能与接口规范[S].2007.
  • 2Nibaldi G H.Specification of A Trusted Computing Base[R].M79-228,the MITRE Corporation,Bedford,MA,USA,Nov.1979.
  • 3Department of Defense Computer Security Center.Department of Defense Trusted Computer System Evaluation Criteria[S].DoD,USA,Dec.1985.
  • 4Brickell E,Camenisch J,Chen L.Direct Anonymous Attestation[C]∥Proceedings of the 11th ACM Conference on Computer and Communications Security,Washington,DC,USA,2004:132-145.
  • 5Group T C.TPM Main Specification,Main Specification Version 1.2[S].March,2006.
  • 6Brickell E,Li J T.Enhanced Privacy ID:A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities[C]∥Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society,2007:21-30.
  • 7Ge H,Liu L.A Method to Implement Direct Anonymous Attestation[EO/BL](2006).http:∥eprint.iacr.org/2006/023.ps,2006.
  • 8Leung A,Chen L Q,Mitchell C J.On A Possible Privacy Flaw in Direct Anonymous Attestation (DAA)[C]∥Proceedings of the First International Conference on Trusted Computing and Trust in Information Technologies,2008:179-190.
  • 9Rudolph C.Covert Identity Information in Direct Anonymous Attestation (DAA)[C]∥Proceedings of the 22nd IFIP TC-11 International Information Security Conference (SEC2007) on New Approaches for Security.Privacy and Trust in Complex Environments,Springer,Boston,2007:443-448.
  • 10Smyth B,Ryan M,Chen L.Direct Anonymous Attestation (DAA):Ensuring Privacy with Corrupt Administrators[C]∥Proceedings of the Fourth European Workshop on Security and Privacy in Ad Hoc and Sensor Networks,Lecture Notes in Computer Science (LNCS).Volume 4572,Springer-Verlag,2007:218-231.

共引文献12

同被引文献24

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部