摘要
智能电网作为下一代的电力网络,能够利用用户实时用电信息对电网运行状态进行有效监控和预测.但是这些实时用户用电信息将会泄漏用户的隐私.如何保护智能电网中用户的隐私性已成为近年来的研究热点,目前智能电表中用户的隐私保护主要包括电表实时发送数据阶段和记账阶段两部分.我们利用可链接直接匿名认证技术(LDAA)和Pedersen承诺构造了一个智能电表用户完整隐私保护系统.在智能电表实时发送数据阶段,我们利用直接匿名认证过程中签名者的匿名性对用户的身份进行隐藏.控制中心得到其所管辖用户的所有数据,但是无法将这些数据与相应的发送者进行匹配.在记账阶段,本文利用Pedersen承诺设计了一种根据用户用电时间和用电量而动态改变费率的计费方案.利用Pedersen承诺的同态性,电力服务商能够获得用户的真实账单,但无法获得用户的实时消费数据.我们的系统支持动态用户加入和撤销,故障用户追踪,数据认证和账单验证等功能,且不需要可信第三方,从而更具实用性.我们对本文提出的系统进行了安全性证明以及功能性和有效性分析,并对我们的系统主要部分进行了模拟实验,实验显示我们的系统能够有效实现.
Smart grid as the next power grid can make use the real-time user energy consumption information to monitor and forecast the status of grid. However, these kind of user information may violate user privacy. How to protect the user's privacy in smart grid has become a hot topic in recent years. The privacy preserving smart metering mainly includes privacy in the process of sending real-time data and privacy in billing. We use the linkable Direct Anonymous Attestation(LDAA) and Pedersen Commitment to construct a full privacy preserving smart metering system. We utilize the anonymity of the signer in DAA to hide the identity of the user in the uploading real-time data phase. In this way, the Control Center is able to obtain all the users' data, but it can not match the identity of a user and his data. We take advantage of the Pedersen Commitment to design a billing that supports dynamic rates, where the rates and consumption of electricity may change dynamically. As the Pedersen Commitment is homomorphic, the Electricity Supplier ultimately obtains a user's monthly billing, but it knows nothing about when the user consumes electricity and how much electricity has been used. Our system supports dynamic users to join and revoke, trace of fault users, data authentication, billing verification. Meanwhile, we need no Trust Third Party, which is more practical. We have made security proof, function and efficiency analysis of the proposed system; meanwhile, we have simulated the main parts of the system, the results show that the system is efficient.
出处
《密码学报》
2014年第4期400-409,共10页
Journal of Cryptologic Research