Secure Multi-party Computation Scheme of Shared Energy Storage Index Based on Blockchain Environment

被引:3
|
作者
Jiang, Xinyue [1 ]
Li, Leyi [2 ]
Qiu, Weiqiang [1 ]
Pei, You [1 ]
Tao, Yibin [3 ]
Lin, Zhenzhi [1 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou, Peoples R China
[2] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou, Peoples R China
[3] China Elect Power Res Inst Co Ltd, Nanjing, Peoples R China
基金
国家重点研发计划;
关键词
shared energy storage; index computation; blockchain; secure multi-party computation;
D O I
10.1109/ICPSAsia52756.2021.9621528
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of the shared energy storage market, an efficient comprehensive evaluation index system can reflect the effectiveness of the market construction. In order to meet the requirements of data authenticity and privacy protection in the computation of shared energy storage evaluation index, a secure multi-party computation (SMPC) scheme for shared energy storage index under blockchain environment is proposed. The scheme takes the characteristics of the hierarchical permissions of the alliance chain into account; and based on the multi-channel architecture, it protects the data encryption process against leakage of data privacy by means of homomorphic encryption method. Finally, an example is presented to verify the effectiveness of the proposed security multi-party computation scheme.
引用
收藏
页码:586 / 591
页数:6
相关论文
共 50 条
  • [21] BFR-MPC: A Blockchain-Based Fair and Robust Multi-Party Computation Scheme
    Gao, Hongmin
    Ma, Zhaofeng
    Luo, Shoushan
    Wang, Zhen
    IEEE ACCESS, 2019, 7 : 110439 - 110450
  • [22] Securing of Clouds Based on Lightweight Secure Multi-party Computation
    Takahashi, Kouta
    Sato, Fumiaki
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 452 - 464
  • [23] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [24] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [25] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [26] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [27] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [28] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [29] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [30] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28