Consumers in electricity markets are becoming more proactive because of the rapid development of demand-response management and distributed energy resources, which boost the transformation of peer-to-peer (P2P) energy-trading mechanisms. However, in the P2P negotiation process, it is a challenging task to prevent private information from being attacked by malicious agents. In this paper, we propose a privacy-preserving, two-party, secure computation mechanism for consensus-based P2P energy trading. First, a novel P2P negotiation mechanism for energy trading is proposed based on the consensus + innovation (C + I) method and the power transfer distribution factor (PTDF), and this mechanism can simultaneously maximize social welfare and maintain physical network constraints. In addition, the C + I method only requires a minimum set of information to be exchanged. Then, we analyze the strategy of malicious neighboring agents colluding to attack in order to steal private information. To defend against this attack, we propose a two-party, secure computation mechanism in order to realize safe negotiation between each pair of prosumers based on Paillier homomorphic encryption (HE), a smart contract (SC), and zero-knowledge proof (ZKP). The energy price is updated in a safe way without leaking any private information. Finally, we simulate the functionality of the privacy-preserving mechanism in terms of convergence performance, computational efficiency, scalability, and SC operations.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9695595PMC
http://dx.doi.org/10.3390/s22229020DOI Listing

Publication Analysis

Top Keywords

two-party secure
12
secure computation
12
computation mechanism
12
energy trading
12
privacy-preserving two-party
8
mechanism consensus-based
8
p2p negotiation
8
mechanism
6
energy
5
consensus-based peer-to-peer
4

Similar Publications

Deep neural networks (DNNs) are phenomenally successful machine learning methods broadly applied to many different disciplines. However, as complex two-party computations, DNN inference using classical cryptographic methods cannot achieve unconditional security, raising concern on security risks of DNNs' application to sensitive data in many domains. We overcome such a weakness by introducing a quantum-aided security approach.

View Article and Find Full Text PDF

Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains.

Entropy (Basel)

July 2023

School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China.

Machine learning has become increasingly popular in academic and industrial communities and has been widely implemented in various online applications due to its powerful ability to analyze and use data. Among all the machine learning models, decision tree models stand out due to their great interpretability and simplicity, and have been implemented in cloud computing services for various purposes. Despite its great success, the integrity issue of online decision tree prediction is a growing concern.

View Article and Find Full Text PDF

Multi-party co-signature scheme based on SM2.

PLoS One

August 2023

School of Mathematics and Statistics, Huizhou University, Guangdong Province, China.

Two-party collaborative signature scheme is an important cryptographic technology for user authentication and data integrity protection when using mobile devices for financial and securities transactions. However, the two-party collaboration scheme has the following shortcomings: firstly, it is not flexible enough, and it requires the collaborating parties to be secure and trusted; secondly, the two-party collaboration security still needs to be improved. Once a hacker obtains the signature private key and collaborative identity of a mobile device, it can construct a legitimate two-party collaborative signature.

View Article and Find Full Text PDF

Consumers in electricity markets are becoming more proactive because of the rapid development of demand-response management and distributed energy resources, which boost the transformation of peer-to-peer (P2P) energy-trading mechanisms. However, in the P2P negotiation process, it is a challenging task to prevent private information from being attacked by malicious agents. In this paper, we propose a privacy-preserving, two-party, secure computation mechanism for consensus-based P2P energy trading.

View Article and Find Full Text PDF

Privacy-preserving -NN interpolation over two encrypted databases.

PeerJ Comput Sci

May 2022

Department of Computer Engineering, Ankara University, Ankara, Turkey.

Cloud computing enables users to outsource their databases and the computing functionalities to a cloud service provider to avoid the cost of maintaining a private storage and computational requirements. It also provides universal access to data, applications, and services without location dependency. While cloud computing provides many benefits, it possesses a number of security and privacy concerns.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!