Secure Multi-party Computation Scheme of Shared Energy Storage Index Based on Blockchain Environment

被引:3
|
作者
Jiang, Xinyue [1 ]
Li, Leyi [2 ]
Qiu, Weiqiang [1 ]
Pei, You [1 ]
Tao, Yibin [3 ]
Lin, Zhenzhi [1 ]
机构
[1] Zhejiang Univ, Coll Elect Engn, Hangzhou, Peoples R China
[2] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou, Peoples R China
[3] China Elect Power Res Inst Co Ltd, Nanjing, Peoples R China
基金
国家重点研发计划;
关键词
shared energy storage; index computation; blockchain; secure multi-party computation;
D O I
10.1109/ICPSAsia52756.2021.9621528
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of the shared energy storage market, an efficient comprehensive evaluation index system can reflect the effectiveness of the market construction. In order to meet the requirements of data authenticity and privacy protection in the computation of shared energy storage evaluation index, a secure multi-party computation (SMPC) scheme for shared energy storage index under blockchain environment is proposed. The scheme takes the characteristics of the hierarchical permissions of the alliance chain into account; and based on the multi-channel architecture, it protects the data encryption process against leakage of data privacy by means of homomorphic encryption method. Finally, an example is presented to verify the effectiveness of the proposed security multi-party computation scheme.
引用
收藏
页码:586 / 591
页数:6
相关论文
共 50 条
  • [41] A Secure Multi-party Signature Scheme Based on Trust Mechanism
    Cheng, Yage
    Hu, Mingsheng
    Wang, Lipeng
    Lei, Yanfang
    Fu, Junjun
    Gong, Bei
    Ma, Wei
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 119 - 132
  • [42] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [43] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
    Gupta, Debayan
    Segal, Aaron
    Panda, Aurojit
    Segev, Gil
    Schapira, Michael
    Feigenbaum, Joan
    Rexford, Jenifer
    Shenker, Scott
    PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
  • [44] Brief Announcement: Secure Data Structures based on Multi-Party Computation
    Toft, Tomas
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
  • [45] Secure Byzantine resilient federated learning based on multi-party computation
    Gao, Hongfeng
    Huang, Hao
    Tian, Youliang
    Tongxin Xuebao/Journal on Communications, 2025, 46 (02): : 108 - 122
  • [46] Secure Multi-Party Computation Based on Cut-and-Choose Technology
    Zhao C.
    Xu J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1800 - 1818
  • [47] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS
    Kosolapov, Yu. V.
    BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
  • [48] Minimal Complete Primitives for Secure Multi-Party Computation
    Matthias Fitzi
    Juan A. Garay
    Ueli Maurer
    Rafail Ostrovsky
    Journal of Cryptology, 2005, 18 : 37 - 61
  • [49] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [50] Round-Optimal Secure Multi-party Computation
    Shai Halevi
    Carmit Hazay
    Antigoni Polychroniadou
    Muthuramakrishnan Venkitasubramaniam
    Journal of Cryptology, 2021, 34