{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:08:19Z","timestamp":1746331699275,"version":"3.40.4"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319103280"},{"type":"electronic","value":"9783319103297"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10329-7_6","type":"book-chapter","created":{"date-parts":[[2014,8,5]],"date-time":"2014-08-05T14:25:29Z","timestamp":1407248729000},"page":"79-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid"],"prefix":"10.1007","author":[{"given":"Henrich C.","family":"P\u00f6hls","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Markus","family":"Karwe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,8,6]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-642-24178-9_9","volume-title":"Information Hiding","author":"G \u00c1cs","year":"2011","unstructured":"\u00c1cs, G., Castelluccia, C.: I Have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118\u2013132. Springer, Heidelberg (2011)"},{"issue":"9\u201310","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1082","DOI":"10.1016\/j.jpubeco.2011.03.003","volume":"95","author":"H Allcott","year":"2011","unstructured":"Allcott, H.: Social norms and energy conservation. J. Public Econ. 95(9\u201310), 1082\u20131095 (2011). (Special Issue: The Role of Firms in Tax Systems)","journal-title":"J. Public Econ."},{"key":"6_CR3","first-page":"183","volume":"2012","author":"M Backes","year":"2012","unstructured":"Backes, M., Meiser, S.: Differentially private smart metering with battery recharging. IACR Cryptology ePrint Archive 2012, 183 (2012)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/3-540-69053-0_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"M Bellare","year":"1997","unstructured":"Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: incrementality at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163\u2013192. Springer, Heidelberg (1997)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-13708-2_6","volume-title":"Applied Cryptography and Network Security","author":"C Brzuska","year":"2010","unstructured":"Brzuska, C., et al.: Redactable signatures for tree-structured data: definitions and constructions. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 87\u2013104. Springer, Heidelberg (2010)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-00468-1_18","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"C Brzuska","year":"2009","unstructured":"Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schr\u00f6der, D., Volk, F.: Security of sanitizable signatures revisited. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 317\u2013336. Springer, Heidelberg (2009)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-32946-3_15","volume-title":"Financial Cryptography and Data Security","author":"T-HH Chan","year":"2012","unstructured":"Chan, T.-H.H., Shi, E., Song, D.: Privacy-preserving stream aggregation with fault tolerance. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 200\u2013214. Springer, Heidelberg (2012)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-00862-7_9","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"E-C Chang","year":"2009","unstructured":"Chang, E.-C., Lim, C.L., Xu, J.: Short redactable signatures using random trees. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 133\u2013147. Springer, Heidelberg (2009)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"issue":"6","key":"6_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.tej.2009.05.014","volume":"22","author":"R Earle","year":"2009","unstructured":"Earle, R., Kahn, E.P., Macan, E.: Measuring the capacity impacts of demand response. Electricity J. 22(6), 47\u201358 (2009)","journal-title":"Electricity J."},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Enev, M., Gupta, S., Kohno, T., Patel, S.N.: Televisions, video privacy, and powerline electromagnetic interference. In: ACM CCS, pp. 537\u2013550. ACM (2011)","DOI":"10.1145\/2046707.2046770"},{"key":"6_CR12","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. BSI TR-03109 @ONLINE (2011)"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-21518-6_21","volume-title":"Information Security and Cryptology","author":"J Gong","year":"2011","unstructured":"Gong, J., Qian, H., Zhou, Y.: Fully-secure and practical sanitizable signatures. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol. 6584, pp. 300\u2013317. Springer, Heidelberg (2011)"},{"key":"6_CR15","unstructured":"Greveler, U., Justus, B., L\u00f6hr, D.: Identifikation von Videoinhalten \u00fcber granulare Stromverbrauchsdaten. In: Sicherheit. LNI, vol. 195, pp. 35\u201345. GI (2012)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Haber, S., Hatano, Y., Honda, Y., Horne, W.G., Miyazaki, K., Sander, T., Tezoku, S., Yao, D.: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In: ASIACCS, pp. 353\u2013362 (2008)","DOI":"10.1145\/1368310.1368362"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Johns, M., Rieck, K.: Smart metering de-pseudonymization. In: ACSAC, pp. 227\u2013236 (2011)","DOI":"10.1145\/2076732.2076764"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Jeske, T.: Privacy-preserving smart metering without a trusted-third-party. In: SECRYPT, pp. 114\u2013123. SciTePress (2011)","DOI":"10.5220\/0003513001140123"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2010.40","volume":"8","author":"MA Lisovich","year":"2010","unstructured":"Lisovich, M.A., Mulligan, D.K., Wicker, S.B.: Inferring personal information from demand-response systems. IEEE Secur. Priv. 8(1), 11\u201320 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: Proceedings of the ASIACCS \u201906, pp. 343\u2013354. ACM, New York (2006)","DOI":"10.1145\/1128817.1128868"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1093\/ietfec\/E88-A.1.239","volume":"88\u2013A(1)","author":"K Miyazaki","year":"2005","unstructured":"Miyazaki, K., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H., Tezuka, S., Imai, H.: Digitally signed document sanitizing scheme with disclosure condition control. IEICE Trans. 88\u2013A(1), 239\u2013246 (2005)","journal-title":"IEICE Trans."},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM BuildSys \u201910, pp. 61\u201366. ACM (2010)","DOI":"10.1145\/1878431.1878446"},{"issue":"1","key":"6_CR24","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/357980.358017","volume":"26","author":"RL Rivest","year":"1983","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(1), 96\u201399 (1983)","journal-title":"Commun. ACM"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-29101-2_2","volume-title":"Information Security Practice and Experience","author":"K Samelin","year":"2012","unstructured":"Samelin, K., P\u00f6hls, H.C., Bilzhause, A., Posegga, J., de Meer, H.: Redactable signatures for independent removal of structure and content. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 17\u201333. Springer, Heidelberg (2012)"},{"key":"6_CR26","unstructured":"Shi, E., Chan, T.-H.H., Rieffel, E.G., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS. The Internet Society (2011)"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45861-1_22","volume-title":"Information Security and Cryptology - ICISC 2001","author":"R Steinfeld","year":"2002","unstructured":"Steinfeld, R., Bull, L., Zheng, Y.: Content extraction signatures. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 285\u2013304. Springer, Heidelberg (2002)"},{"key":"6_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38030-3_1","volume-title":"Smart Grid Security","author":"D von Oheimb","year":"2013","unstructured":"von Oheimb, D.: IT security architecture approaches for smart metering and smart grid. In: Cuellar, J. (ed.) SmartGridSec 2012. LNCS, vol. 7823, pp. 1\u201325. Springer, Heidelberg (2013)"},{"issue":"3","key":"6_CR29","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1007\/s10916-010-9639-0","volume":"36","author":"Z-Y Wu","year":"2012","unstructured":"Wu, Z.-Y., Hsueh, C.-W., Tsai, C.-Y., Lai, F., Lee, H.-C., Chung, Y.: Redactable signatures for signed CDA documents. J. Med. Syst. 36(3), 1795\u20131808 (2012)","journal-title":"J. Med. Syst."},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Ziekow, H., Goebel, C., Str\u00fcker, J., Jacobsen, H.-A.: The potential of smart home sensors in forecasting household electricity demand. In: SmartGridComm (2013)","DOI":"10.1109\/SmartGridComm.2013.6687962"}],"container-title":["Lecture Notes in Computer Science","Smart Grid Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10329-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T02:15:47Z","timestamp":1746324947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10329-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319103280","9783319103297"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10329-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"6 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}