Batch Verification of Linkable Ring Signature in Smart Grid

Author(s):  
Qiyu Wang ◽  
Jie Chen ◽  
Lishuang Zhuang
2020 ◽  
Vol 16 (10) ◽  
pp. 6607-6616 ◽  
Author(s):  
Yong Ding ◽  
Bingyao Wang ◽  
Yujue Wang ◽  
Kun Zhang ◽  
Huiyong Wang

2013 ◽  
Vol 284-287 ◽  
pp. 3380-3384 ◽  
Author(s):  
Huei Ru Tseng

The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. By letting EVs discharge during peak hours and charge during off-peak hours, V2G networks could bring numerous social and technical benefits to the smart grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast authentication. In 2011, Guo et al. proposed a unique batch authentication protocol for V2G communications. There are three parties in V2G communications, including an aggregator, a smart grid control centre, and individual EVs. The proposed idea is that instead of verifying each packet for each vehicle, the aggregator verifies the received batch of packets with only one signature verification. They used DSA signature for the batch authentication and claimed their protocol is strong enough to defend against security attacks. In this paper, we investigate the security of Guo et al.’s protocol. More precisely, we show that any attackers can easily forge signatures satisfying the batch verification criterion without the knowledge of the signer’s private key. To remedy the security flaw of Guo et al.’s protocol, we proposed a simple and secure improvement of Guo et al.’s protocol. The key point of the improved protocol is that we make multiple signatures in order. The attacker or the dishonest signer cannot transpose these digital signatures such that the aggregator passes the validation of the batch verifying multiple digital signatures. Based on Guo et al.’s protocol, the security of our proposed protocol is the same as that of their protocol except that our improved protocol has no security flaw of their protocol. Therefore, the improved protocol is secure to detect forged multiple signatures.


2020 ◽  
Vol 112 ◽  
pp. 512-523
Author(s):  
Cheng Guo ◽  
Xueru Jiang ◽  
Kim-Kwang Raymond Choo ◽  
Xinyu Tang ◽  
Jing Zhang

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Fei Tang ◽  
Junjie Pang ◽  
Kefei Cheng ◽  
Qianhong Gong

As the next-generation power grid system, the smart grid can realize the balance of supply and demand and help in communication security and privacy protection. However, real-time power consumption data collection might expose the users’ privacy information, such as their living habits and economic conditions. In addition, during the process of data transmission, it may lead to data inconsistency between the user side and the storage side. Blockchain provides tamper-resistant and traceable characteristics for solving these problems, and ring signature schemes provide an anonymous authentication mechanism. Therefore, in this work, we consider the applications of ring signature scheme in smart grid based on blockchain. We introduce the notion of multi-authority traceable ring signature (MA-TRS) scheme for distributed setting. In our scheme, there is an auditing node that can distinguish the identity of the real signer from the ring without any secret information. Last but not least, we prove that the proposed scheme is unforgeable, anonymous, and traceable.


2014 ◽  
Vol 960-961 ◽  
pp. 832-835 ◽  
Author(s):  
Jie Chen ◽  
Yue Yu Zhang

Smart grid puts forward high requirements for the equipment to access authentication, which achieves openness and real-time performance in mart grid. The users’ identities need to protect, in the meanwhile, identity authentication and data encryption should be efficient. According to the characteristics of smart grid, this paper proposed an identity-based aggregation signcryption scheme which combined pseudonymous ID with batch verification. The scheme adopted the pseudonym technology to achieve the user identity anonymity, and adopted the signcryption to complete digital signature and encryption in one time. This paper presented the aggregation signcryption for different multiple users by dynamic equation, which can compromise the security and computation overhead to meet the requirements of smart grid. This scheme can reduce the computational burden of aggregators with security of communication data. Moreover, this scheme solved the difficult problem of the management of pseudonymous ID, and improved the efficiency of the whole system. Therefore, this scheme meets the requirement of real time and high efficiency in smart grid.


Sign in / Sign up

Export Citation Format

Share Document