Skip to main content
Top
Published in: Wireless Personal Communications 2/2022

23-06-2022

A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids

Authors: Huiwen Wang, Liangliang Wang, Mi Wen, Kefei Chen, Yiyuan Luo

Published in: Wireless Personal Communications | Issue 2/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

There exists a problem of user privacy leakage in the smart grids (SGs) that malicious attackers may intercept or tamper with electricity data and associate the stolen data with real users to commit crimes. Besides, node equipment resources in the SGs are limited. Aiming at the problems above, most of the existing privacy-preserving schemes apply aggregate signature to ensure the integrity of message and improve communication efficiency. However, they cannot realize the anonymity of users to block link attacks, and their aggregate signature verification usually has a high computational cost. Therefore, we propose a certificateless aggregate ring signature (CLARS) scheme based on computational Diffie-Hellman problem and decisional Diffie-Hellman problem. Our scheme is suitable for privacy-preserving in SGs. In this scheme, certificateless cryptosystem is used to avoid key escrow and certificates management problems and ring signature is used to ensure the unconditional anonymity of users. In addition, our scheme is proved to be unforgeability and unconditional anonymity under adaptively chosen message attacks against Type I and Type II adversaries in the random oracle model. Compared with previous certificateless aggregate signature schemes, our CLARS scheme has lower computational cost, which only needs two pairing operations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sultan, S. (2019). Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey. Computers & Security, 84, 148–165.CrossRef Sultan, S. (2019). Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey. Computers & Security, 84, 148–165.CrossRef
2.
go back to reference Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on information theory, 22(6), 644–654.MathSciNetCrossRef Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on information theory, 22(6), 644–654.MathSciNetCrossRef
3.
go back to reference Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques (pp. 47–53). Springer. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques (pp. 47–53). Springer.
4.
go back to reference Al-Riyami, S. S., Paterson, K. G. (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security (pp. 452–473). Springer. Al-Riyami, S. S., Paterson, K. G. (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security (pp. 452–473). Springer.
5.
go back to reference Boneh, D., Gentry, C., Lynn, B., Shacham, H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques (pp. 416–432). Springer. Boneh, D., Gentry, C., Lynn, B., Shacham, H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques (pp. 416–432). Springer.
6.
go back to reference Yang, T., Kong, L., Hu, J., & Chen, Z. (2012). Survey on aggregate signature and its applications. Journal of Computer Research and Development, 49(s2), 192–199. Yang, T., Kong, L., Hu, J., & Chen, Z. (2012). Survey on aggregate signature and its applications. Journal of Computer Research and Development, 49(s2), 192–199.
7.
go back to reference Yu-wen, H.A.O. (2016) A novel authentication scheme on the internet of things based on aggregate signature. Computer and Modernization (6), 103 (2016) Yu-wen, H.A.O. (2016) A novel authentication scheme on the internet of things based on aggregate signature. Computer and Modernization (6), 103 (2016)
8.
go back to reference Rivest, R. L., Shamir, A., Tauman, Y. (2001) How to leak a secret. In International conference on the theory and application of cryptology and information security (pp. 552–565). Springer. Rivest, R. L., Shamir, A., Tauman, Y. (2001) How to leak a secret. In International conference on the theory and application of cryptology and information security (pp. 552–565). Springer.
9.
go back to reference Yang, X., Wu, W., Liu, J. K., Chen, X. (2015) Lightweight anonymous authentication for ad hoc group: A ring signature approach. In International conference on provable security (pp. 215–226). Springer. Yang, X., Wu, W., Liu, J. K., Chen, X. (2015) Lightweight anonymous authentication for ad hoc group: A ring signature approach. In International conference on provable security (pp. 215–226). Springer.
10.
go back to reference Malina, L., Hajny, J., Dzurenda, P., Ricci, S. (2018) Lightweight ring signatures for decentralized privacy-preserving transactions. In ICETE (Vol. 2, pp. 692–697). Malina, L., Hajny, J., Dzurenda, P., Ricci, S. (2018) Lightweight ring signatures for decentralized privacy-preserving transactions. In ICETE (Vol. 2, pp. 692–697).
11.
go back to reference Liu, Y., Liu, X., Tang, C., Wang, J., & Zhang, L. (2018). Unlinkable coin mixing scheme for transaction privacy enhancement of bitcoin. IEEE Access, 6, 23261–23270.CrossRef Liu, Y., Liu, X., Tang, C., Wang, J., & Zhang, L. (2018). Unlinkable coin mixing scheme for transaction privacy enhancement of bitcoin. IEEE Access, 6, 23261–23270.CrossRef
12.
go back to reference Li, X., Mei, Y., Gong, J., Xiang, F., & Sun, Z. (2020). A blockchain privacy protection scheme based on ring signature. IEEE Access, 8, 76765–76772.CrossRef Li, X., Mei, Y., Gong, J., Xiang, F., & Sun, Z. (2020). A blockchain privacy protection scheme based on ring signature. IEEE Access, 8, 76765–76772.CrossRef
13.
go back to reference Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., Cepeda, R. (2010) Privacy for smart meters: Towards undetectable appliance load signatures. In 2010 first IEEE international conference on smart grid communications (pp. 232–237). IEEE. Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., Cepeda, R. (2010) Privacy for smart meters: Towards undetectable appliance load signatures. In 2010 first IEEE international conference on smart grid communications (pp. 232–237). IEEE.
14.
go back to reference He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T. (2007) Pda: Privacy-preserving data aggregation in wireless sensor networks. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications (pp. 2045–2053). IEEE. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T. (2007) Pda: Privacy-preserving data aggregation in wireless sensor networks. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications (pp. 2045–2053). IEEE.
15.
go back to reference Groat, M.M., Hey, W., Forrest, S. (2011) Kipda: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In 2011 proceedings IEEE INFOCOM (pp. 2024–2032). IEEE. Groat, M.M., Hey, W., Forrest, S. (2011) Kipda: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In 2011 proceedings IEEE INFOCOM (pp. 2024–2032). IEEE.
16.
go back to reference Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access, 5, 3302–3312.CrossRef Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access, 5, 3302–3312.CrossRef
17.
go back to reference Wang, S., Huang, L., Nie, Y., Zhang, X., Wang, P., Xu, H., & Yang, W. (2019). Local differential private data aggregation for discrete distribution estimation. IEEE Transactions on Parallel and Distributed Systems, 30(9), 2046–2059.CrossRef Wang, S., Huang, L., Nie, Y., Zhang, X., Wang, P., Xu, H., & Yang, W. (2019). Local differential private data aggregation for discrete distribution estimation. IEEE Transactions on Parallel and Distributed Systems, 30(9), 2046–2059.CrossRef
18.
go back to reference Bista, R., Kim, Y.-K., Song, M.-S., & Chang, J.-W. (2012). Improving data confidentiality and integrity for data aggregation in wireless sensor networks. IEICE Transactions on Information and Systems, 95(1), 67–77.CrossRef Bista, R., Kim, Y.-K., Song, M.-S., & Chang, J.-W. (2012). Improving data confidentiality and integrity for data aggregation in wireless sensor networks. IEICE Transactions on Information and Systems, 95(1), 67–77.CrossRef
19.
go back to reference Li, C., Lu, R., Li, H., Chen, L., & Chen, J. (2015). Pda: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Security and Communication Networks, 8(15), 2494–2506.CrossRef Li, C., Lu, R., Li, H., Chen, L., & Chen, J. (2015). Pda: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Security and Communication Networks, 8(15), 2494–2506.CrossRef
20.
go back to reference Zhang, J., Zhao, Y., Wu, J., & Chen, B. (2020). Lvpda: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled iot. IEEE Internet of Things Journal, 7(5), 4016–4027.CrossRef Zhang, J., Zhao, Y., Wu, J., & Chen, B. (2020). Lvpda: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled iot. IEEE Internet of Things Journal, 7(5), 4016–4027.CrossRef
21.
go back to reference Tan, X., Zheng, J., Zou, C., & Niu, Y. (2016). Pseudonym-based privacy-preserving scheme for data collection in smart grid. International Journal of Ad Hoc and Ubiquitous Computing, 22(2), 120–127.CrossRef Tan, X., Zheng, J., Zou, C., & Niu, Y. (2016). Pseudonym-based privacy-preserving scheme for data collection in smart grid. International Journal of Ad Hoc and Ubiquitous Computing, 22(2), 120–127.CrossRef
22.
go back to reference Efthymiou, C., Kalogridis, G. (2010) Smart grid privacy via anonymization of smart metering data. In 2010 First IEEE international conference on smart grid communications (pp 238–243). IEEE. Efthymiou, C., Kalogridis, G. (2010) Smart grid privacy via anonymization of smart metering data. In 2010 First IEEE international conference on smart grid communications (pp 238–243). IEEE.
23.
go back to reference Ren, W., Song, J., Yang, Y., & Ren, Y. (2011). Lightweight privacy-aware yet accountable secure scheme for sm-sgcc communications in smart grid. Tsinghua Science and Technology, 16(6), 640–647.CrossRef Ren, W., Song, J., Yang, Y., & Ren, Y. (2011). Lightweight privacy-aware yet accountable secure scheme for sm-sgcc communications in smart grid. Tsinghua Science and Technology, 16(6), 640–647.CrossRef
24.
go back to reference Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.MathSciNetCrossRef Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.MathSciNetCrossRef
25.
go back to reference Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman Advances in Proceedings of Crypto (Vol. 82). Plenum. Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman Advances in Proceedings of Crypto (Vol. 82). Plenum.
26.
go back to reference Liu, X., Zhang, Y., Wang, B., & Wang, H. (2014). An anonymous data aggregation scheme for smart grid systems. Security and Communication Networks, 7(3), 602–610.CrossRef Liu, X., Zhang, Y., Wang, B., & Wang, H. (2014). An anonymous data aggregation scheme for smart grid systems. Security and Communication Networks, 7(3), 602–610.CrossRef
27.
go back to reference Cheung, J. C., Chim, T. W., Yiu, S. -M., Li, V. O., Hui, L. C. (2011). Credential-based privacy-preserving power request scheme for smart grid network. In 2011 IEEE global telecommunications conference-GLOBECOM (pp. 1–5). IEEE. Cheung, J. C., Chim, T. W., Yiu, S. -M., Li, V. O., Hui, L. C. (2011). Credential-based privacy-preserving power request scheme for smart grid network. In 2011 IEEE global telecommunications conference-GLOBECOM (pp. 1–5). IEEE.
28.
go back to reference Chaum, D., Van Heyst, E. (1991) Group signatures. In Workshop on the theory and application of of cryptographic techniques (pp. 257–265). Springer. Chaum, D., Van Heyst, E. (1991) Group signatures. In Workshop on the theory and application of of cryptographic techniques (pp. 257–265). Springer.
29.
go back to reference Gai, K., Wu, Y., Zhu, L., Xu, L., & Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 6(5), 7992–8004.CrossRef Gai, K., Wu, Y., Zhu, L., Xu, L., & Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 6(5), 7992–8004.CrossRef
30.
go back to reference Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for iiot environments. IEEE Transactions on Industrial Informatics, 14(8), 3701–3711.CrossRef Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for iiot environments. IEEE Transactions on Industrial Informatics, 14(8), 3701–3711.CrossRef
31.
go back to reference Zhang, S., Rong, J., & Wang, B. (2020). A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. International Journal of Electrical Power & Energy Systems, 121, 106140.CrossRef Zhang, S., Rong, J., & Wang, B. (2020). A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. International Journal of Electrical Power & Energy Systems, 121, 106140.CrossRef
32.
go back to reference Bouakkaz, S., & Semchedine, F. (2020). A certificateless ring signature scheme with batch verification for applications in vanet. Journal of Information Security and Applications, 55, 102669.CrossRef Bouakkaz, S., & Semchedine, F. (2020). A certificateless ring signature scheme with batch verification for applications in vanet. Journal of Information Security and Applications, 55, 102669.CrossRef
33.
go back to reference Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems, 18, 80–89. Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems, 18, 80–89.
34.
go back to reference Liu, J., Wang, L., & Yu, Y. (2020). Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet of Things Journal, 7(6), 5256–5266.CrossRef Liu, J., Wang, L., & Yu, Y. (2020). Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet of Things Journal, 7(6), 5256–5266.CrossRef
35.
go back to reference Lee, D.-H., Yim, K., & Lee, I.-Y. (2020). A certificateless aggregate arbitrated signature scheme for iot environments. Sensors, 20(14), 3983.CrossRef Lee, D.-H., Yim, K., & Lee, I.-Y. (2020). A certificateless aggregate arbitrated signature scheme for iot environments. Sensors, 20(14), 3983.CrossRef
36.
go back to reference Kar, J., Liu, X., & Li, F. (2021). Cl-ass: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks. Journal of Information Security and Applications, 61, 102905.CrossRef Kar, J., Liu, X., & Li, F. (2021). Cl-ass: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks. Journal of Information Security and Applications, 61, 102905.CrossRef
37.
go back to reference Mei, Q., Xiong, H., Chen, J., Yang, M., Kumari, S., & Khan, M. K. (2020). Efficient certificateless aggregate signature with conditional privacy preservation in iov. IEEE Systems Journal, 15(1), 245–256.CrossRef Mei, Q., Xiong, H., Chen, J., Yang, M., Kumari, S., & Khan, M. K. (2020). Efficient certificateless aggregate signature with conditional privacy preservation in iov. IEEE Systems Journal, 15(1), 245–256.CrossRef
38.
go back to reference Wu, G., Zhang, F., Shen, L., Guo, F., & Susilo, W. (2020). Certificateless aggregate signature scheme secure against fully chosen-key attacks. Information Sciences, 514, 288–301.MathSciNetCrossRef Wu, G., Zhang, F., Shen, L., Guo, F., & Susilo, W. (2020). Certificateless aggregate signature scheme secure against fully chosen-key attacks. Information Sciences, 514, 288–301.MathSciNetCrossRef
Metadata
Title
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids
Authors
Huiwen Wang
Liangliang Wang
Mi Wen
Kefei Chen
Yiyuan Luo
Publication date
23-06-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09809-5

Other articles of this Issue 2/2022

Wireless Personal Communications 2/2022 Go to the issue