{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:44:15Z","timestamp":1760424255356,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531844","type":"print"},{"value":"9789819531851","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3185-1_6","type":"book-chapter","created":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:05:55Z","timestamp":1760421955000},"page":"81-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-quantum Privacy-Preserving Smart Meter Data Collection Scheme from\u00a0Coding"],"prefix":"10.1007","author":[{"given":"Yixuan","family":"Huang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fangguo","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Almaleh, A., Lahiq, S., Al-Shehri, F.: Smart grid privacy via differential privacy of smart metering data. pp. 556\u2013561 (2023). https:\/\/doi.org\/10.1109\/ICCIT58132.2023.10273939","DOI":"10.1109\/ICCIT58132.2023.10273939"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Arif, A., Al-Hussain, M., Al-Mutairi, N., Al-Ammar, E., Khan, Y., Malik, N.: Experimental study and design of smart energy meter for the smart grid. pp. 515\u2013520 (2013). https:\/\/doi.org\/10.1109\/IRSEC.2013.6529714","DOI":"10.1109\/IRSEC.2013.6529714"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-3-642-29011-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A Becker","year":"2012","unstructured":"Becker, A., Joux, A., May, A., Meurer, A.: Decoding random binary linear codes in 2n\/20: how 1+1 = 0 improves information set decoding. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 520\u2013536. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_31"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384\u2013386 (1978). https:\/\/doi.org\/10.1109\/TIT.1978.1055873","DOI":"10.1109\/TIT.1978.1055873"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-030-25510-7_21","volume-title":"Post-Quantum Cryptography","author":"P Branco","year":"2019","unstructured":"Branco, P., Mateus, P.: A traceable ring signature scheme based on coding theory. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 387\u2013403. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_21"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_7"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Cao, Y., Wang, Y., Ding, Y., Guo, Z., Yang, C., Liang, H.: A lightweight PUF-based group authentication scheme for privacy-preserving metering data collection in smart grid 562, 321\u2013340 (2023). https:\/\/doi.org\/10.1007\/978-3-031-54528-3_18","DOI":"10.1007\/978-3-031-54528-3_18"},{"issue":"7","key":"6_CR8","doi-asserted-by":"publisher","first-page":"5000","DOI":"10.1109\/TII.2021.3119685","volume":"18","author":"SA Chaudhry","year":"2022","unstructured":"Chaudhry, S.A., Nebhen, J., Yahya, K., Al-Turjman, F.M.: A privacy enhanced authentication scheme for securing smart grid infrastructure. IEEE Trans. Ind. Informatics 18(7), 5000\u20135006 (2022). https:\/\/doi.org\/10.1109\/TII.2021.3119685","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Boston (1983). https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Diao, F., Zhang, F., Cheng, X.: A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans. Smart Grid 6(1), 461\u2013467 (2015). https:\/\/doi.org\/10.1109\/TSG.2014.2358225","DOI":"10.1109\/TSG.2014.2358225"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","volume":"14","author":"X Fang","year":"2012","unstructured":"Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid the new and improved power grid: a survey. IEEE Commun. Surv. Tutorials 14(4), 944\u2013980 (2012). https:\/\/doi.org\/10.1109\/SURV.2011.101911.00087","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.dcan.2022.01.004","volume":"8","author":"N Gai","year":"2022","unstructured":"Gai, N., Xue, K., Zhu, B., Yang, J., Liu, J., He, D.: An efficient data aggregation scheme with local differential privacy in smart grid. Digit. Commun. Networks 8(3), 333\u2013342 (2022). https:\/\/doi.org\/10.1016\/j.dcan.2022.01.004","journal-title":"Digit. Commun. Networks"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/s41928-020-0372-5","volume":"3","author":"Y Gao","year":"2020","unstructured":"Gao, Y., Al-Sarawi, S.F., Abbott, D.: Physical unclonable functions. Nature Electron. 3(2), 81\u201391 (2020). https:\/\/doi.org\/10.1038\/s41928-020-0372-5","journal-title":"Nature Electron."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Giaconi, G., G\u00fcnd\u00fcz, D., Poor, H.V.: 10 smart meter data privacy. advanced data analytics for power systems p.\u00a0230 (2021). https:\/\/arxiv.org\/pdf\/2009.01364","DOI":"10.1017\/9781108859806.014"},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1002\/j.1538-7305.1952.tb01393.x","volume":"31","author":"EN Gilbert","year":"1952","unstructured":"Gilbert, E.N.: A comparison of signalling alphabets. Bell Syst. Tech. J. 31(3), 504\u2013522 (1952). https:\/\/doi.org\/10.1002\/j.1538-7305.1952.tb01393.x","journal-title":"Bell Syst. Tech. J."},{"key":"6_CR17","unstructured":"Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Robustness of the learning with errors assumption. pp. 230\u2013240 (2010). http:\/\/conference.iiis.tsinghua.edu.cn\/ICS2010\/content\/papers\/19.html"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Harishma, B., et al.: Safe is the new smart: PUF-based authentication for load modification-resistant smart meters. IEEE Trans. Dependable Secure Comput. 19(1), 663\u2013680 (2022). https:\/\/doi.org\/10.1109\/TDSC.2020.2992801","DOI":"10.1109\/TDSC.2020.2992801"},{"issue":"12","key":"6_CR19","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/5.192069","volume":"80","author":"G Hart","year":"1992","unstructured":"Hart, G.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870\u20131891 (1992). https:\/\/doi.org\/10.1109\/5.192069","journal-title":"Proc. IEEE"},{"issue":"3","key":"6_CR20","doi-asserted-by":"publisher","first-page":"2882","DOI":"10.1109\/TASE.2023.3270543","volume":"21","author":"D Li","year":"2024","unstructured":"Li, D., Yang, Q., Zhang, F., Wang, Y., Qian, Y., An, D.: Research on privacy issues in smart metering system: an improved TCN-based NILM attack method and practical DRL-based rechargeable battery assisted privacy preserving method. IEEE Trans. Autom. Sci. Eng. 21(3), 2882\u20132899 (2024). https:\/\/doi.org\/10.1109\/TASE.2023.3270543","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-27800-9_28","volume-title":"Information Security and Privacy","author":"JK Liu","year":"2004","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signature for Ad Hoc groups. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 325\u2013335. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27800-9_28"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Liu, X., Wang, L.P.: A postquantum linkable ring signature scheme from coding theory. Secur. Commun. Networks 2023(1), 1794053 (2023). https:\/\/doi.org\/10.1155\/2023\/1794053","DOI":"10.1155\/2023\/1794053"},{"key":"6_CR23","doi-asserted-by":"publisher","unstructured":"Marandi, A., Alves, P.G.M.R., Aranha, D.F., Jacobsen, R.H.: Lattice-based homomorphic encryption for privacy-preserving smart meter data analytics. Comput. J. 67(5), 1687\u20131698 (2023).https:\/\/doi.org\/10.1093\/comjnl\/bxad093","DOI":"10.1093\/comjnl\/bxad093"},{"issue":"6","key":"6_CR24","doi-asserted-by":"publisher","first-page":"9816","DOI":"10.1109\/JIOT.2019.2932085","volume":"6","author":"I Natgunanathan","year":"2019","unstructured":"Natgunanathan, I., Hossain, M.B., Xiang, Y., Gao, L., Peng, D., Li, J.: Progressive average-based smart meter privacy enhancement using rechargeable batteries. IEEE Internet Things J. 6(6), 9816\u20139828 (2019). https:\/\/doi.org\/10.1109\/JIOT.2019.2932085","journal-title":"IEEE Internet Things J."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"National Institute of Standards and Technology: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions. Technical Report FIPS PUB 202, U.S. Department of Commerce (2015). https:\/\/doi.org\/10.6028\/NIST.FIPS.202","DOI":"10.6028\/NIST.FIPS.202"},{"issue":"5","key":"6_CR26","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1109\/TNSM.2024.3357103","volume":"21","author":"K Prateek","year":"2024","unstructured":"Prateek, K., Das, M., Surve, S., Maity, S., Amin, R.: Q-secure-p$${^2}$$-sma: Quantum-secure privacy- preserving smart meter authentication for unbreakable security in smart grid. IEEE Trans. Netw. Serv. Manag. 21(5), 5149\u20135163 (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3357103","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_32"},{"issue":"1","key":"6_CR28","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1109\/TSG.2022.3189598","volume":"14","author":"PA Schirmer","year":"2023","unstructured":"Schirmer, P.A., Mporas, I.: Non-intrusive load monitoring: a review. IEEE Trans. Smart Grid 14(1), 769\u2013784 (2023). https:\/\/doi.org\/10.1109\/TSG.2022.3189598","journal-title":"IEEE Trans. Smart Grid"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-48329-2_2","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 93","author":"J Stern","year":"1994","unstructured":"Stern, J.: A new identification scheme based on syndrome decoding. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 13\u201321. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_2"},{"key":"6_CR30","unstructured":"Strategy, N.M.G.: Advanced metering infrastructure. US Department of Energy Office of Electricity and Energy Reliability (2008). https:\/\/www.smart-energy.com\/wp-content\/uploads\/i\/AMI%2520White%2520paper%2520final%2520021108%2520%25282%2529%2520APPROVED_2008_02_12.pdf"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"Sui, Z., Li, J.: An auditable and efficient prepaid scheme with privacy preservation in smart grids. pp. 48\u201355 (2023). https:\/\/doi.org\/10.1109\/BIGCOMP57234.2023.00016","DOI":"10.1109\/BIGCOMP57234.2023.00016"},{"key":"6_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-66399-9_25","volume-title":"Computer Security \u2013 ESORICS 2017","author":"S-F Sun","year":"2017","unstructured":"Sun, S.-F., Au, M.H., Liu, J.K., Yuen, T.H.: RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 456\u2013474. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_25"},{"key":"6_CR33","unstructured":"Tian, Y.: Research on privacy-preserving data collection scheme for post-quantum smart grid (in Chinese) (2020)"},{"issue":"10","key":"6_CR34","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.7544\/issn1000-1239.2019.20190402","volume":"56","author":"Y Tian","year":"2019","unstructured":"Tian, Y., Zhang, H., Xie, S., Zhang, F.: Post-quantum privacy preserving smart metering system. J. Comput. Res. Dev. 56(10), 2229\u20132242 (2019). https:\/\/doi.org\/10.7544\/issn1000-1239.2019.20190402","journal-title":"J. Comput. Res. Dev."},{"key":"6_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-31979-5_5","volume-title":"Information Security Practice and Experience","author":"PP Tsang","year":"2005","unstructured":"Tsang, P.P., Wei, V.K.: Short linkable ring signatures for E-Voting, E-Cash and attestation. In: Deng, R.H., Bao, F., Pang, H.H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 48\u201360. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31979-5_5"},{"key":"6_CR36","unstructured":"U.S. Department of Energy: 2020 smart grid system report (2022). https:\/\/www.energy.gov\/oe\/articles\/2020-smart-grid-system-report"},{"key":"6_CR37","unstructured":"Varshamov, R.R.: Estimate of the number of signals in error correcting codes. Docklady Akad. Nauk, SSSR 117, 739\u2013741 (1957). https:\/\/cir.nii.ac.jp\/crid\/1572543024443421056"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"Xu, W., Sun, J., Cardell-Oliver, R., Mian, A., Hong, J.B.: A privacy-preserving framework using homomorphic encryption for smart metering systems. Sensors 23(10), 4746 (2023). https:\/\/doi.org\/10.3390\/s23104746","DOI":"10.3390\/s23104746"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3185-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:06:03Z","timestamp":1760421963000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3185-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"ISBN":["9789819531844","9789819531851"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3185-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"13 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}