{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:17:21Z","timestamp":1743056241017,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813342132"},{"type":"electronic","value":"9789813342149"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-33-4214-9_16","type":"book-chapter","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T05:26:34Z","timestamp":1606195594000},"page":"209-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Scheme Based on Group Signature in Smart Grid"],"prefix":"10.1007","author":[{"given":"Yalian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jinbiao","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qingyu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,20]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"7596","DOI":"10.1109\/JSEN.2017.2735539","volume":"17","author":"R Morello","year":"2017","unstructured":"Morello, R., Mukhopadhyay, S., Liu, Z., et al.: Advances on sensing technologies for smart cities and power grids: a review. IEEE Sens. J. 17, 7596\u20137610 (2017). https:\/\/doi.org\/10.1109\/JSEN.2017.2735539","journal-title":"IEEE Sens. J."},{"key":"16_CR2","first-page":"806","volume":"38","author":"F Mohamed Amine","year":"2017","unstructured":"Mohamed Amine, F., Leandros, M., Helge, J., et al.: A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain. Cities Soc. 38, 806\u2013835 (2017)","journal-title":"Sustain. Cities Soc."},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/TSG.2015.2412091","volume":"7","author":"YM Gong","year":"2016","unstructured":"Gong, Y.M., Cai, Y., Guo, Y.X., et al.: A privacy-preserving scheme for incentive-based demand response in the smart grid. IEEE Trans. Smart Grid 7, 1304\u20131313 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1504\/IJAHUC.2016.077203","volume":"22","author":"XB Tan","year":"2016","unstructured":"Tan, X.B., Zheng, J.Y., Zou, C., et al.: Pseudonym-based privacy-preserving scheme for data collection in smart grid. Int. J. Ad Hoc Ubiquit. Comput. 22, 48\u201356 (2016)","journal-title":"Int. J. Ad Hoc Ubiquit. Comput."},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1049\/iet-com.2016.0091","volume":"10","author":"LN Wang","year":"2016","unstructured":"Wang, L.N., Wang, H.Q., Khan, M., He, D.B.: Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10, 1795\u20131802 (2016)","journal-title":"IET Commun."},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management","author":"FD Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 226\u2013238. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22444-7_15"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/MCOM.2012.6194398","volume":"50","author":"GM Felix","year":"2012","unstructured":"Felix, G.M., Christoph, S., Osman, U., et al.: Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun. Mag. 50, 166\u2013172 (2012)","journal-title":"IEEE Commun. Mag."},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1504\/IJSN.2011.039631","volume":"6","author":"FJ Li","year":"2011","unstructured":"Li, F.J., Luo, B., Liu, P.: Secure and privacy-preserving information aggregation for smart grids. IJSN 6, 28\u201339 (2011)","journal-title":"IJSN"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","volume":"25","author":"H Li","year":"2014","unstructured":"Li, H., Lin, X., Yang, H., Liang, X., et al.: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25, 2053\u20132064 (2014). https:\/\/doi.org\/10.1109\/TPDS.2013.124","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.3390\/app5041503","volume":"5","author":"JB Hur","year":"2015","unstructured":"Hur, J.B., Koo, D., Shin, Y.: Privacy-preserving smart metering with authentication in a smart grid. Appl. Sci. 5, 1503\u20131527 (2015)","journal-title":"Appl. Sci."},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.adhoc.2017.05.011","volume":"64","author":"M Badra","year":"2017","unstructured":"Badra, M., Zeadally, S.: Lightweight and efficient privacy-preserving data aggregation approach for the smart grid. Ad Hoc Netw. 64, 32\u201340 (2017)","journal-title":"Ad Hoc Netw."},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.future.2018.02.034","volume":"84","author":"D Abbasinezhad-Mood","year":"2018","unstructured":"Abbasinezhad-Mood, D., Nikooghadam, N.M.: Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. Future Gener. Comput. Syst. 84, 47\u201357 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.02.034","journal-title":"Future Gener. Comput. Syst."},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2017","unstructured":"Mahmood, K., Chaudhry, S., Naqvi, H., et al.: An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 81, 557\u2013565 (2017). https:\/\/doi.org\/10.1016\/j.future.2017.05.002","journal-title":"Future Gener. Comput. Syst."},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology\u2014CRYPTO 2000","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255\u2013270. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44598-6_16"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jpdc.2019.09.016","volume":"136","author":"W Kong","year":"2019","unstructured":"Kong, W., Shen, J., Vijayakumar, P., et al.: A practical group blind signature scheme for privacy protection in smart grid. J. Parallel Distrib. Comput. 136, 29\u201339 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.compeleceng.2016.02.017","volume":"52","author":"K Mahmood","year":"2016","unstructured":"Mahmood, K., Chaudhry, S., Naqvi, H., Shon, T., et al.: A lightweight message authentication scheme for smart grid communications in power sector. Comput. Electr. Eng. 52, 114\u2013124 (2016)","journal-title":"Comput. Electr. Eng."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Sule, R., Katti, R.S., Kavasseri, R.G.: A variable length fast message authentication code for secure communication in smart grids. In: 2012 IEEE Power and Energy Society General Meeting, pp. 1\u20136 (2012)","DOI":"10.1109\/PESGM.2012.6345622"},{"key":"16_CR18","first-page":"1334","volume":"11","author":"LP Zhang","year":"2016","unstructured":"Zhang, L.P., Tang, S.Y., Luo, H.: Elliptic curve cryptography-based authentication with identity protection for smart grids. PloS One 11, 1334\u20131345 (2016)","journal-title":"PloS One"},{"key":"16_CR19","doi-asserted-by":"publisher","unstructured":"Hwang, J.Y., Yung, M., Lee, D.H.: Universal forgery of the identity-based sequential aggregate signature scheme. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, January 2009, pp. 157\u2013160 (2019). https:\/\/doi.org\/10.1145\/1533057.1533080","DOI":"10.1145\/1533057.1533080"},{"key":"16_CR20","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"T Yanik","year":"2014","unstructured":"Yanik, T., Kilinc, H.: A survey of SIP authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16, 1005\u20131023 (2014)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4214-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T05:33:49Z","timestamp":1606196029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4214-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813342132","9789813342149"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4214-9_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CWSN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Conference on Wireless Sensor Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dunhuang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cwsn2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cwsn2020.aconf.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3\/5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}