Vol.5 No.1 (February 2015)
Smart Grid Payment Scheme Based on Ring Signature and Certificateless Signature
With the continuous development of smart grid technologies in recent years, while smart meter system provides more accurate control and measurement of electrical loads, it has brought infor-mation disclosure risks to the user. Researchers have proposed some algorithms, which anonymize user information through the password techniques; but these algorithms have drawbacks that anonymity is not complete, the calculation amount is large, and interactions are complex. This paper puts forward a payment scheme based on ring signature and certificateless signature to protect the privacy of users while completing electricity data collection and payment correctly. The scheme uses anonymous payment algorithm to make a trusted third party only produce the private key of user part. It achieves unconditional anonymity, and reduces computational spending at the whole process and thus has a good practical value.
王 玮 , 曲海鹏 , 尚 鹏 , 石沙沙 (2015) 基于环签名及无证书签名的智能电网缴费方案。 智能电网， 5， 20-26. doi: 10.12677/SG.2015.51003
 Rial, A., Leuven, K.U. & IBBT, Leuven, Belgium, G. (2010) Privacy-preserving smart metering technical report. MSRTR-2010-150, Microsoft Research, 49-60.
 The Smart Grid Interoperability Panel (2009) Smart grid cyber security strategy and requirements. Technical Report 7628, National Institute of Standards and Technology, Vol. 2.
 Lisovich, M.A. and Wicker, S.B. (2008) Privacy concerns in upcoming residential and commercial de-mand-response system. Power Systems Conference, 553-570.
 McDaniel, P. and McLaughlin, S. (2009) Security and privacy challenges in the smart grid. IEEE Security and Privacy, 7, 75-77.
 Wagner, A., Speiser, S., Raabe, O. and Harth, A. (2010) Linked data for a privacy-aware smart gird. 448-454.
 Lemay, M., Gross, G., Gunter, A. and Garg, S. (2007) United architecture for largr-scale attested metering. International Conference on System Sciences, 1503-1605.
 Alinas, S.S. and Li, M. (2012) Mesh and Ad Hoc Communications and Networks. 9th Annual IEEE Communications Society Conference, 18-21 June 2012, 605-613.
 Garcia, F. and Jacobs, B. (2010) Priva-cy-Friendly Energy-Metering via Homomorphic Encryption. Workshop on Security and Trust Management, 226-239.
 龚凡 (2013) 基于群签名的智能电网用电量统计及电费的缴费方案. 硕士论文, 西安电子科技大学, 西安.
 Rivest, R.L., Shamir, A. and Tauman, Y. (2001) How to leak a secret. LNCS 2248. Spring-Verlag, Berlin, 552-565.
 Zhang, F. and Kim, K. (2002) ID based blind sighature and ring signature from pairings. Spring-Verlag, Berlin, 533- 576.
 Bresson, E., Stern, J. and Szydlo, M. (2002) Threshold ring signatures for ad-hoc groups. LNCS 2501. Spring-Verlag, Berlin, 465-480.
 王文强, 陈少真 (2009) 一种基于身份的高效环签名方案. 计算机应用, 11, 10-14.
 Harn, L., Ren J. and Lin, C.L. (2009) Design of DL-based certificateless digital signatures. Journal of System and Software, 82, 789-793.
 Duan, S.S. (2008) Certificateless undeniable signature scheme. Information Sciences, 178, 742-755.
 Bessie, C.H., Zhang, Z.F. and Dong, X.T. (2007) Certificateless signature: A new security model and improved generic construction. Designs, Codes and Cryptography, 42, 109-125.
 梁红梅, 黄振杰 (2010) 高效无证书签名方案的安全性分析和改进. 计算机应用, 3, 685-687.