Secure Multi-party Computation Scheme of Shared Energy Storage Index Based on Blockchain Environment

被引:3
|
作者
Jiang, Xinyue [1 ]
Li, Leyi [2 ]
Qiu, Weiqiang [1 ]
Pei, You [1 ]
Tao, Yibin [3 ]
Lin, Zhenzhi [1 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou, Peoples R China
[2] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou, Peoples R China
[3] China Elect Power Res Inst Co Ltd, Nanjing, Peoples R China
基金
国家重点研发计划;
关键词
shared energy storage; index computation; blockchain; secure multi-party computation;
D O I
10.1109/ICPSAsia52756.2021.9621528
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of the shared energy storage market, an efficient comprehensive evaluation index system can reflect the effectiveness of the market construction. In order to meet the requirements of data authenticity and privacy protection in the computation of shared energy storage evaluation index, a secure multi-party computation (SMPC) scheme for shared energy storage index under blockchain environment is proposed. The scheme takes the characteristics of the hierarchical permissions of the alliance chain into account; and based on the multi-channel architecture, it protects the data encryption process against leakage of data privacy by means of homomorphic encryption method. Finally, an example is presented to verify the effectiveness of the proposed security multi-party computation scheme.
引用
收藏
页码:586 / 591
页数:6
相关论文
共 50 条
  • [31] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [32] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [33] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [34] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [35] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [36] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
  • [37] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [38] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [39] Secure Multi-party Computation and Its Applications
    Veugen, Thijs
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
  • [40] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)