How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Wallet Databases with Observers
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Off-the-record communication, or, why not to use PGP
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A 2-Round Anonymous Veto Protocol
Security Protocols
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Private memoirs of a smart meter
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
Privacy-friendly energy-metering via homomorphic encryption
STM'10 Proceedings of the 6th international conference on Security and trust management
Curve25519: new diffie-hellman speed records
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Protecting against physical resource monitoring
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Privacy-preserving smart metering
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
A practical smart metering system supporting privacy preserving billing and load monitoring
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Private computation of spatial and temporal power consumption with smart meters
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Differentially private continual monitoring of heavy hitters from distributed streams
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Fault-tolerant privacy-preserving statistics
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
On significance of the least significant bits for differential privacy
Proceedings of the 2012 ACM conference on Computer and communications security
Privacy-friendly tasking and trading of energy in smart grids
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Privacy-preserving smart metering with regional statistics and personal enquiry services
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Privacy-preserving smart metering with multiple data Consumers
Computer Networks: The International Journal of Computer and Telecommunications Networking
A security protocol for information-centric networking in smart grids
Proceedings of the first ACM workshop on Smart energy grid security
Implementation of privacy-friendly aggregation for the smart grid
Proceedings of the first ACM workshop on Smart energy grid security
Smart meter aggregation via secret-sharing
Proceedings of the first ACM workshop on Smart energy grid security
Analysis of the impact of data granularity on privacy for the smart grid
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Private aggregation for presence streams
Future Generation Computer Systems
Hi-index | 0.00 |
The widespread deployment of smart meters for the modernisation of the electricity distribution network, but also for gas and water consumption, has been associated with privacy concerns due to the potentially large number of measurements that reflect the consumers behaviour. In this paper, we present protocols that can be used to privately compute aggregate meter measurements over defined sets of meters, allowing for fraud and leakage detection as well as network management and further statistical processing of meter measurements, without revealing any additional information about the individual meter readings. Thus, most of the benefits of the Smart Grid can be achieved without revealing individual data. The feasibility of the protocols has been demonstrated with an implementation on current smart meters.