{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:29:31Z","timestamp":1770154171852,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_20","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:09Z","timestamp":1770109089000},"page":"350-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Distributed Privacy-Preserving Data Aggregation Scheme for\u00a0Smart Grid with\u00a0False Data Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4607-1306","authenticated-orcid":false,"given":"Xinyi","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4437-7792","authenticated-orcid":false,"given":"Peng","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9357-9388","authenticated-orcid":false,"given":"Yifei","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8551-8826","authenticated-orcid":false,"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/3441558","volume":"64","author":"G Oakes","year":"2021","unstructured":"Oakes, G.: Enabling renewable energy through smarter grids. Commun. ACM 64, 11 (2021)","journal-title":"Commun. ACM"},{"issue":"23","key":"20_CR2","doi-asserted-by":"publisher","first-page":"7596","DOI":"10.1109\/JSEN.2017.2735539","volume":"17","author":"R Morello","year":"2017","unstructured":"Morello, R., Mukhopadhyay, S.C., Liu, Z., Slomovitz, D., Samantaray, S.R.: Advances on sensing technologies for smart cities and power grids: a review. IEEE Sens. J. 17(23), 7596\u20137610 (2017)","journal-title":"IEEE Sens. J."},{"issue":"15","key":"20_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"20_CR4","unstructured":"Borges, F.: On Privacy-preserving protocols for smart metering systems. On Privacy-Preserving Protocols for Smart Metering Systems (2015)"},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"4097","DOI":"10.1109\/TII.2021.3119963","volume":"18","author":"X Hao","year":"2022","unstructured":"Hao, X., Ren, W., Choo, K., Xiong, N.: A self-trading and authenticated roaming scheme based on blockchain for smart grids. IEEE Trans. Industr. Inf. 18, 4097\u20134106 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"20_CR6","first-page":"1","volume":"17","author":"J Wang","year":"2021","unstructured":"Wang, J., Wu, L., Zeadally, S., Khan, M.K., He, D.: Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid. ACM Trans. Sens. Netw. (TOSN) 17, 1\u201325 (2021)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"issue":"6","key":"20_CR7","doi-asserted-by":"publisher","first-page":"5268","DOI":"10.1109\/TSG.2021.3099347","volume":"13","author":"X Luo","year":"2021","unstructured":"Luo, X., Xue, K., Xu, J., Sun, Q., Zhang, Y.: Blockchain based secure data aggregation and distributed power dispatching for microgrids. IEEE Trans. Smart Grid 13(6), 5268\u20135279 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","volume":"15","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Guo, W., Fan, C.I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3PDA) scheme for smart grid. IEEE Trans. Industr. Inform. 15, 1767\u20131774 (2018)","journal-title":"IEEE Trans. Industr. Inform."},{"key":"20_CR9","unstructured":"Bonomi, F., Addepalli, R.M.J.Z.S.: Fog computing and its role in the internet of things. ACM (2018)"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"3733","DOI":"10.1109\/TII.2018.2803782","volume":"14","author":"L Lyu","year":"2018","unstructured":"Lyu, L., Nandakumar, K., Rubinstein, B., Jin, J., Bedo, J., Palaniswami, M.: PPFA: privacy preserving fog-enabled aggregation in smart grid. IEEE Trans. Industr. Inform. 14, 3733\u20133744 (2018)","journal-title":"IEEE Trans. Industr. Inform."},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TNSE.2019.2892583","volume":"7","author":"HQ Wu","year":"2019","unstructured":"Wu, H.Q., Wang, L., Xue, G.: Privacy-aware task allocation and data aggregation in fog-assisted spatial crowdsourcing. IEEE Trans. Netw. Sci. Eng. 7, 589\u2013602 (2019)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"3","key":"20_CR12","first-page":"14","volume":"20","author":"GK Verma","year":"2023","unstructured":"Verma, G.K., Gope, P., Saxena, N., Kumar, N.: CB-DA: lightweight and escrow-free certificate-based data aggregation for smart grid. IEEE Trans. Dependable Secure Comput. (T-DSC) 20(3), 14 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput. (T-DSC)"},{"issue":"12","key":"20_CR13","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.1109\/TPDS.2022.3153930","volume":"33","author":"Y Zhan","year":"2022","unstructured":"Zhan, Y., Zhou, L., Wang, B., Duan, P., Zhang, B.: Efficient function queryable and privacy preserving data aggregation scheme in smart grid. IEEE Trans. Parallel Distrib. Syst. 33(12), 3430\u20133441 (2022)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"20_CR14","doi-asserted-by":"publisher","first-page":"4065","DOI":"10.1109\/TII.2020.3014401","volume":"17","author":"X Wang","year":"2021","unstructured":"Wang, X., Liu, Y., Choo, K.K.R.: Fault-tolerant multisubset aggregation scheme for smart grid. IEEE Trans. Industr. Inf. 17(6), 4065\u20134072 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"20_CR15","doi-asserted-by":"publisher","first-page":"2145","DOI":"10.1109\/TDSC.2023.3300749","volume":"21","author":"C Hu","year":"2024","unstructured":"Hu, C., Liu, Z., Li, R., Hu, P., Xiang, T., Han, M.: Smart contract assisted privacy-preserving data aggregation and management scheme for smart grid. IEEE Trans. Dependable Secure Comput. 21(4), 2145\u20132161 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"20_CR16","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1109\/TDSC.2021.3124546","volume":"19","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Huang, C., Zhang, Y., Cao, S.: Enabling verifiable privacy-preserving multi-type data aggregation in smart grids. IEEE Trans. Dependable Secure Comput. 19(6), 4225\u20134239 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"20_CR17","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TNSM.2020.3048822","volume":"18","author":"W Lu","year":"2021","unstructured":"Lu, W., Ren, Z., Xu, J., Chen, S.: Edge blockchain assisted lightweight privacy-preserving data aggregation for smart grid. IEEE Trans. Netw. Serv. Manage. 18(2), 1246\u20131259 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"6","key":"20_CR18","doi-asserted-by":"publisher","first-page":"5813","DOI":"10.1109\/TSG.2024.3433385","volume":"15","author":"GS Wagh","year":"2024","unstructured":"Wagh, G.S., Mishra, S., Agarwal, A.: A distributed privacy-preserving framework with integrity verification capabilities for metering data and dynamic billing in a malicious setting. IEEE Trans. Smart Grid 15(6), 5813\u20135825 (2024)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"20_CR19","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TSG.2019.2920836","volume":"11","author":"JN Liu","year":"2020","unstructured":"Liu, J.N., Weng, J., Yang, A., Chen, Y., Lin, X.: Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid. IEEE Trans. Smart Grid 11(1), 247\u2013257 (2020)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"8","key":"20_CR20","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.3390\/s18082659","volume":"18","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., et al.: Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8), 2659 (2018)","journal-title":"Sensors"},{"issue":"6","key":"20_CR21","doi-asserted-by":"publisher","first-page":"6112","DOI":"10.1109\/TSG.2024.3435054","volume":"15","author":"L Lei","year":"2024","unstructured":"Lei, L., Wang, F., Zhao, C., Xu, L.: Efficient blockchain-based data aggregation scheme with privacy-preserving on the smart grid. IEEE Trans. Smart Grid 15(6), 6112\u20136125 (2024)","journal-title":"IEEE Trans. Smart Grid"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"A Kate","year":"2010","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177\u2013194. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_11"},{"issue":"11","key":"20_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-46766-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"D Beaver","year":"1992","unstructured":"Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420\u2013432. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_34"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11761679_1","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"JH Cheon","year":"2006","unstructured":"Cheon, J.H.: Security analysis of the strong Diffie-Hellman problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 1\u201311. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_1"},{"issue":"4","key":"20_CR26","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1145\/322217.322225","volume":"27","author":"JT Schwartz","year":"1980","unstructured":"Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM (JACM) 27(4), 701\u2013717 (1980)","journal-title":"J. ACM (JACM)"},{"key":"20_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/3-540-09519-5_73","volume-title":"Symbolic and Algebraic Computation","author":"R Zippel","year":"1979","unstructured":"Zippel, R.: Probabilistic algorithms for sparse polynomials. In: Ng, E.W. (ed.) Symbolic and Algebraic Computation. LNCS, vol. 72, pp. 216\u2013226. Springer, Heidelberg (1979). https:\/\/doi.org\/10.1007\/3-540-09519-5_73"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:11Z","timestamp":1770109091000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}