Education, Science, Technology, Innovation and Life
Open Access
Sign In

An Electricity Blockchain Transaction Privacy Protection Scheme based on Homomorphic Encryption

Download as PDF

DOI: 10.23977/iotea.2019.41001 | Downloads: 50 | Views: 3479

Author(s)

Zhang Shaomin 1, Zhang Qiqi 1, Wang Baoyi 1

Affiliation(s)

1 School of Control and Computer Engineering, North China Electric Power University, Baoding 071003, China

Corresponding Author

Zhang Shaomin

ABSTRACT

An electricity blockchain based on smart contract is designed by introducing decentralization into smart grid in this paper. The data in blockchain may reveal user privacy due to transparency. Therefore, a blockchain privacy protection scheme based on additive homomorphic encryption algorithm is proposed. The electricity and account balance of users are encrypted by the homomorphic encryption algorithm in the scheme to realize the confidentiality of data ensuring electricity billing. Finally, the security of the scheme is proved and the performance of the scheme is analyzed. The encryption algorithm of the scheme has less computational complexity and higher efficiency.

KEYWORDS

Decentralization, blockchain, smart contract, privacy protection, additional homomorphic encryption, LWE

CITE THIS PAPER

Shaomin, Z., Qiqi, Z., Baoyi, W., An Electricity Blockchain Transaction Privacy Protection Scheme based on Homomorphic Encryption, Internet of Things (IoT) and Engineering Applications (2019) 4: 1-6. DOI: http://dx.doi.org/10.23977/iotea.2019.41001.

REFERENCES

[1] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Consulted, 2008.
[2] WANG Anping, FAN Jingang, GUO Yanlai. Application of Blockchain in Energy Interconnection [J].  Electric Power Information and Communication Technology,2016(9): 1-6(in Chinese).
[3] Tsai WT, Yu L, Wang R, Liu N, Deng EY. Blockchain application development techniques. Ruan Jian Xue Bao/ Journal of Software, 2017,28(6):1474−1487 (in Chinese).
[4] WANG Hao, SONG Xiangfu, KE Junming,et al. Blockchain and Privacy Preserving Mechanisms in Cryptocurrency [J]. Netinfo Security, 2017(7):32-39(in Chinese).
[5] Liao K, Zhao Z, Doupe A, et al. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin[C]// Electronic Crime Research. IEEE, 2016:1-13.
[6] Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen. Survey on Privacy Preserving Techniques for Blockchain Technology. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
[7] Bergan T, Anderson O, Devietti J, et al. CryptoNote v 2.0 [J]. 2013.
[8] Monero. About monero [EB/OL]. [2017-11-08]. https://getmonero.org/resources/about/
[9] Miller A, Moeser M, Lee K, et al. An Empirical Analysis of Linkability in the Monero Blockchain[J]. 2017.
[10] Miers I, Garman C, Green M, et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin [J]. IEEE Symposium on Security & Privacy, 2013:397-411.
[11] Sasson E B, Chiesa A, Garman C, et al. Zerocash: Decentralized Anonymous Payments from Bitcoin[C]// IEEE Symposium on Security and Privacy. IEEE Computer Society, 2014:459-474.
[12] Ben-Sasson E, Chiesa A, Genkin D, et al. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge[M]// Advances in Cryptology – CRYPTO 2013. Springer Berlin Heidelberg, 2013:90-108.
[13] Guo Xiaoli, Zhang Jiajia, Wang XiuLei.The research and application of information privacy protection method for smart grid users [J]. Electrical Measurement & Instrumentation, 2016, 53(24):94-99.
[14] Tsai WT, Yu L, Wang R, Liu N, Deng EY. Blockchain Application Development Techniques[J]. Journal of Software, 2017, 28(6): 1474-1487(in Chinese).
[15] C. Peikert. Publi-key Cryptosystems from the worst-case shortest vector problem:  extended abstract[C]. Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, 2009, 333-342.
[16] O. Regev. On lattices, learning with errors, random linear codes, and cryptography[C]. Proceedings of the 37th Annual ACM Symposium on Theory of Computing, STOC 2005, Baltimore, MD, USA, 2005, 84-93.
[17] Gentry C,Halevi S,Vaikuntanathan V.A Simple BGN-type Cryptosystem from LWE [C] //Proceedings of the29th Annual International Conference on the Theory andApplications of Cryptographic Techniques. Berlin,Germany: Springer,2010: 506-522.
[18] WU Guangxian, LIU Nianyi, LIU Boya. Design and Application of BGN-type CPA Secure Encryption Scheme Based on LWE. Computer Engineering, 2016, 42(12): 118-123(in Chinese).

Downloads: 813
Visits: 67991

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.