4.5 Article

Secure and efficient mutual authentication protocol for smart grid under blockchain

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain

Shunli Ma et al.

Summary: The study introduces an abstract framework of a decentralized smart contract system with balance and transaction amount hiding property over an account-model blockchain. A homomorphic public-key encryption scheme is used to build a concrete system with such properties and a highly efficient non-interactive zero knowledge (NIZK) argument is constructed based on the encryption scheme to ensure the validity of transactions. The proposed NIZK argument significantly improves the time efficiency in generating a proof compared to previous similar constructions, albeit at the expense of a relatively longer proof size.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Engineering, Electrical & Electronic

FPDP: Flexible Privacy-Preserving Data Publishing Scheme for Smart Agriculture

Jingcheng Song et al.

Summary: The development of IoT and 5G is driving smart agriculture forward, but it also raises concerns about security and privacy. This article proposes a privacy-preserving data aggregation scheme using the ElGamal Cryptosystem to address these issues.

IEEE SENSORS JOURNAL (2021)

Article Computer Science, Information Systems

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities

Amritraj Singh et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing

Xiaoying Jia et al.

IEEE SYSTEMS JOURNAL (2020)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

Jing Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid

Sahil Garg et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Real-Time Fault Detection for IIoT Facilities Using GBRBM-Based DNN

Huakun Huang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

A Covert Communication Method Using Special Bitcoin Addresses Generated by Vanitygen

Lejun Zhang et al.

CMC-COMPUTERS MATERIALS & CONTINUA (2020)

Article Computer Science, Theory & Methods

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain

Chao Lin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

A provably secure and anonymous message authentication scheme for smart grids

Xiong Li et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Information Systems

Anonymous and Efficient Message Authentication Scheme for Smart Grid

Libing Wu et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

Credit-Based Payments for Fast Computing Resource Trading in Edge-Assisted Internet of Things

Zhenni Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Review Computer Science, Hardware & Architecture

A survey on privacy protection in blockchain system

Qi Feng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Automation & Control Systems

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System

Neeraj Kumar et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Information Systems

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid

Zhitao Guan et al.

SCIENCE CHINA-INFORMATION SCIENCES (2019)

Article Engineering, Electrical & Electronic

Security and Privacy for the Industrial Internet of Things An overview of approaches to safeguarding endpoints

Lu Zhou et al.

IEEE SIGNAL PROCESSING MAGAZINE (2018)

Article Automation & Control Systems

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Engineering, Electrical & Electronic

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography

Debiao He et al.

IET COMMUNICATIONS (2016)

Article Computer Science, Theory & Methods

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Electrical & Electronic

Cyber-Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem

Aldar C. -F. Chan et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2014)

Article Computer Science, Theory & Methods

Security arguments for digital signatures and blind signatures

D Pointcheval et al.

JOURNAL OF CRYPTOLOGY (2000)