{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:59:56Z","timestamp":1767985196109,"version":"3.49.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319573380","type":"print"},{"value":"9783319573397","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57339-7_11","type":"book-chapter","created":{"date-parts":[[2017,4,19]],"date-time":"2017-04-19T05:08:50Z","timestamp":1492578530000},"page":"184-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling"],"prefix":"10.1007","author":[{"given":"Joppe W.","family":"Bos","sequence":"first","affiliation":[]},{"given":"Wouter","family":"Castryck","sequence":"additional","affiliation":[]},{"given":"Ilia","family":"Iliashenko","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Vercauteren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,20]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.rser.2014.01.069","volume":"33","author":"A Ahmad","year":"2014","unstructured":"Ahmad, A., Hassan, M., Abdullah, M., Rahman, H., Hussin, F., Abdullah, H., Saidur, R.: A review on applications of ANN and SVM for building electrical energy consumption forecasting. Renew. Sustain. Energ. Rev. 33, 102\u2013109 (2014)","journal-title":"Renew. Sustain. Energ. Rev."},{"key":"11_CR2","unstructured":"Albrecht, M.: Complexity estimates for solving LWE (2000\u20132004). https:\/\/bitbucket.org\/malb\/lwe-estimator\/raw\/HEAD\/estimator.py"},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Cryptology 9(3), 169\u2013203 (2015)","journal-title":"J. Math. Cryptology"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-45239-0_4","volume-title":"Cryptography and Coding","author":"JW Bos","year":"2013","unstructured":"Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 45\u201364. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-45239-0_4"},{"key":"11_CR5","unstructured":"Commission for Energy Regulation: Electricity smart metering customer behaviour trials (CBT) findings report. Technical Report CER11080a (2011). http:\/\/www.cer.ie\/docs\/000340\/cer11080(a)(i).pdf"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Costache, A., Smart, N.P., Vivek, S., Waller, A.: Fixed point arithmetic in SHE schemes. In: SAC 2016. LNCS. Springer (2016)","DOI":"10.1007\/978-3-319-69453-5_22"},{"key":"11_CR7","unstructured":"CryptoExperts: FV-NFLlib (2016). https:\/\/github.com\/CryptoExperts\/FV-NFLlib"},{"key":"11_CR8","unstructured":"CryptoExperts, INP ENSEEIHT, and Quarkslab: NFLlib (2016). https:\/\/github.com\/quarkslab\/NFLlib"},{"key":"11_CR9","unstructured":"Department of Energy & Climate Change: Smart metering implementation programme. Technical Report Third Annual Report on the Roll-out of Smart Meters (2014). https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/384190\/smip_smart_metering_annual_report_2014.pdf"},{"key":"11_CR10","unstructured":"Department of Energy, Climate Change: Smart metering implementation programme - data access, privacy. https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/43043\/4933-data-access-privacy-con-doc-smart-meter.pdf"},{"key":"11_CR11","unstructured":"Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: Manual for using homomorphic encryption for bioinformatics. Technical report, Technical report MSR-TR-2015-87, Microsoft Research (2015)"},{"key":"11_CR12","unstructured":"Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K.E., Naehrig, M., Wernsing, J.: Cryptonets: applying neural networks to encrypted data with high throughput and accuracy. In: Balcan, M., Weinberger, K.Q. (eds.) International Conference on Machine Learning, vol. 48, pp. 201\u2013210. JMLR.org (2016)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-31284-7_33","volume-title":"Applied Cryptography and Network Security","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z., Tsudik, G.: Private computation of spatial and temporal power consumption with smart meters. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 561\u2013577. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-31284-7_33"},{"key":"11_CR14","unstructured":"European Commission: Commission recommendation of 9 on preparations for the roll-out of smart metering systems. Official Journal of the European Union (2012). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:32012H0148"},{"key":"11_CR15","unstructured":"European Commission: Benchmarking smart metering deployment in the EU-27 with a focus on electricity. Technical Report 365, June 2014. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52014DC0356&from=EN"},{"key":"11_CR16","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012, 144 (2012)"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Koo, B.G., Lee, S.W., Kim, W., Park, J.H.: Comparative study of short-term electric load forecasting. In: Conference on Intelligent Systems, Modelling and Simulation, pp. 463\u2013467, January 2014","DOI":"10.1109\/ISMS.2014.85"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management","author":"FD Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 226\u2013238. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-22444-7_15"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: ACM Symposium on Theory of Computing - STOC 2009, pp. 169\u2013178. ACM (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"12","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/5.192069","volume":"80","author":"GW Hart","year":"1992","unstructured":"Hart, G.W.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870\u20131891 (1992)","journal-title":"Proc. IEEE"},{"issue":"3","key":"11_CR21","doi-asserted-by":"publisher","first-page":"1460","DOI":"10.1109\/SURV.2014.032014.00094","volume":"16","author":"L Hernandez","year":"2014","unstructured":"Hernandez, L., Baladron, C., Aguiar, J.M., Carro, B., Sanchez-Esguevillas, A.J., Lloret, J., Massana, J.: A survey on electric power demand forecasting: future trends in smart grids, microgrids and smart buildings. IEEE Commun. Surv. Tutorials 16(3), 1460\u20131495 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"11_CR22","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/0005-1098(70)90092-0","volume":"6","author":"A Ivakhnenko","year":"1970","unstructured":"Ivakhnenko, A.: Heuristic self-organization in problems of engineering cybernetics. Automatica 6(2), 207\u2013219 (1970)","journal-title":"Automatica"},{"key":"11_CR23","unstructured":"Jawurek, M., Kerschbaum, F., Danezis, G.: Privacy technologies for smart grids - a survey of options. Technical Report MSR-TR-2012-119, November 2012. http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=178055"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-22263-4_10","volume-title":"Privacy Enhancing Technologies","author":"K Kursawe","year":"2011","unstructured":"Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 175\u2013191. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-22263-4_10"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: Smart Grid Communication, pp. 327\u2013332. IEEE (2010)","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"11_CR26","unstructured":"Livni, R., Shalev-Shwartz, S., Shamir, O.: On the computational efficiency of training neural networks. In: Advances in Neural Information Processing Systems, pp. 855\u2013863 (2014)"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1\u201323. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-13190-5_1"},{"issue":"6","key":"11_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/2535925","volume":"60","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM 60(6), 35 (2013). Article 43","journal-title":"J. ACM"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-319-29485-8_20","volume-title":"Topics in Cryptology - CT-RSA 2016","author":"C Aguilar-Melchor","year":"2016","unstructured":"Aguilar-Melchor, C., Barrier, J., Guelton, S., Guinet, A., Killijian, M.-O., Lepoint, T.: NFLlib: NTT-based fast lattice library. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 341\u2013356. Springer, Cham (2016). doi:10.1007\/978-3-319-29485-8_20"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Molina-Markham, A., Shenoy, P.J., Fu, K., Cecchet, E., Irwin, D.E.: Private memoirs of a smart meter. In: Ruzzelli, A.G. (ed.) Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings, pp. 61\u201366. ACM (2010)","DOI":"10.1145\/1878431.1878446"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi:10.1007\/3-540-48910-X_16"},{"key":"11_CR32","unstructured":"Recommendation to the European Commission: Essential regulatory requirements and recommendations for data handling, data safety, and consumer protection. Technical Report version 1.0 (2011). https:\/\/ec.europa.eu\/energy\/sites\/ener\/files\/documents\/Recommendations"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Workshop on Privacy in the Electronic Society, WPES 2011, pp. 49\u201360. ACM (2011)","DOI":"10.1145\/2046556.2046564"},{"issue":"11","key":"11_CR34","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"key":"11_CR35","unstructured":"Smart Grid Coordination Group: Smart grid information security, November 2012. http:\/\/ec.europa.eu\/energy\/sites\/ener\/files\/documents\/xpert_group.1_security.pdf"},{"issue":"1","key":"11_CR36","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1016\/j.neucom.2008.08.006","volume":"72","author":"D Srinivasan","year":"2008","unstructured":"Srinivasan, D.: Energy demand prediction using GMDH networks. Neurocomputing 72(1), 625\u2013629 (2008)","journal-title":"Neurocomputing"},{"key":"11_CR37","unstructured":"The Smart Grid Interoperability Panel - Smart Grid Cybersecurity Committee: Guidelines for smart grid cybersecurity: volume 1 - smart grid cybersecurity strategy, architecture, and high-level requirements. Technical Report NISTIR 7628 Rev 1 (2014). http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2014\/NIST.IR.7628r1.pdf"},{"key":"11_CR38","doi-asserted-by":"crossref","unstructured":"Veit, A., Goebel, C., Tidke, R., Doblander, C., Jacobsen, H.-A.: Household electricity demand forecasting: benchmarking state-of-the-art methods. In: Conference on future energy systems, pp. 233\u2013234. ACM (2014)","DOI":"10.1145\/2602044.2602082"},{"key":"11_CR39","unstructured":"Xie, P., Bilenko, M., Finley, T., Gilad-Bachrach, R., Lauter, K.E., Naehrig, M.: Crypto-nets: neural networks over encrypted data. CoRR, abs\/1412.6181 (2014)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57339-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T14:16:08Z","timestamp":1710166568000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-57339-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319573380","9783319573397"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57339-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"20 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dakar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Senegal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/site\/africacrypt2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}