An Electricity Blockchain Transaction Privacy Protection Scheme based on Homomorphic Encryption
DOI: 10.23977/iotea.2019.41001 | Downloads: 54 | Views: 3878
Author(s)
Zhang Shaomin 1, Zhang Qiqi 1, Wang Baoyi 1
Affiliation(s)
1 School of Control and Computer Engineering, North China Electric Power University, Baoding 071003, China
Corresponding Author
Zhang ShaominABSTRACT
An electricity blockchain based on smart contract is designed by introducing decentralization into smart grid in this paper. The data in blockchain may reveal user privacy due to transparency. Therefore, a blockchain privacy protection scheme based on additive homomorphic encryption algorithm is proposed. The electricity and account balance of users are encrypted by the homomorphic encryption algorithm in the scheme to realize the confidentiality of data ensuring electricity billing. Finally, the security of the scheme is proved and the performance of the scheme is analyzed. The encryption algorithm of the scheme has less computational complexity and higher efficiency.
KEYWORDS
Decentralization, blockchain, smart contract, privacy protection, additional homomorphic encryption, LWECITE THIS PAPER
Shaomin, Z., Qiqi, Z., Baoyi, W., An Electricity Blockchain Transaction Privacy Protection Scheme based on Homomorphic Encryption, Internet of Things (IoT) and Engineering Applications (2019) 4: 1-6. DOI: http://dx.doi.org/10.23977/iotea.2019.41001.
REFERENCES
[1] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Consulted, 2008.
[2] WANG Anping, FAN Jingang, GUO Yanlai. Application of Blockchain in Energy Interconnection [J]. Electric Power Information and Communication Technology,2016(9): 1-6(in Chinese).
[3] Tsai WT, Yu L, Wang R, Liu N, Deng EY. Blockchain application development techniques. Ruan Jian Xue Bao/ Journal of Software, 2017,28(6):1474−1487 (in Chinese).
[4] WANG Hao, SONG Xiangfu, KE Junming,et al. Blockchain and Privacy Preserving Mechanisms in Cryptocurrency [J]. Netinfo Security, 2017(7):32-39(in Chinese).
[5] Liao K, Zhao Z, Doupe A, et al. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin[C]// Electronic Crime Research. IEEE, 2016:1-13.
[6] Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen. Survey on Privacy Preserving Techniques for Blockchain Technology. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
[7] Bergan T, Anderson O, Devietti J, et al. CryptoNote v 2.0 [J]. 2013.
[8] Monero. About monero [EB/OL]. [2017-11-08]. https://getmonero.org/resources/about/
[9] Miller A, Moeser M, Lee K, et al. An Empirical Analysis of Linkability in the Monero Blockchain[J]. 2017.
[10] Miers I, Garman C, Green M, et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin [J]. IEEE Symposium on Security & Privacy, 2013:397-411.
[11] Sasson E B, Chiesa A, Garman C, et al. Zerocash: Decentralized Anonymous Payments from Bitcoin[C]// IEEE Symposium on Security and Privacy. IEEE Computer Society, 2014:459-474.
[12] Ben-Sasson E, Chiesa A, Genkin D, et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge[M]// Advances in Cryptology – CRYPTO 2013. Springer Berlin Heidelberg, 2013:90-108.
[13] Guo Xiaoli, Zhang Jiajia, Wang XiuLei.The research and application of information privacy protection method for smart grid users [J]. Electrical Measurement & Instrumentation, 2016, 53(24):94-99.
[14] Tsai WT, Yu L, Wang R, Liu N, Deng EY. Blockchain Application Development Techniques[J]. Journal of Software, 2017, 28(6): 1474-1487(in Chinese).
[15] C. Peikert. Publi-key Cryptosystems from the worst-case shortest vector problem: extended abstract[C]. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, 2009, 333-342.
[16] O. Regev. On lattices, learning with errors, random linear codes, and cryptography[C]. Proceedings of the 37th Annual ACM Symposium on Theory of Computing, STOC 2005, Baltimore, MD, USA, 2005, 84-93.
[17] Gentry C,Halevi S,Vaikuntanathan V.A Simple BGN-type Cryptosystem from LWE [C] //Proceedings of the29th Annual International Conference on the Theory andApplications of Cryptographic Techniques. Berlin,Germany: Springer,2010: 506-522.
[18] WU Guangxian, LIU Nianyi, LIU Boya. Design and Application of BGN-type CPA Secure Encryption Scheme Based on LWE. Computer Engineering, 2016, 42(12): 118-123(in Chinese).
Downloads: | 928 |
---|---|
Visits: | 74846 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks