{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:01:50Z","timestamp":1746504110297,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819647309","type":"print"},{"value":"9789819647316","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-4731-6_18","type":"book-chapter","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T07:03:07Z","timestamp":1746428587000},"page":"363-380","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in\u00a0Smart Grid"],"prefix":"10.1007","author":[{"given":"Jiangang","family":"Lu","sequence":"first","affiliation":[]},{"given":"Yunfan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qinqin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Benhan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mingxin","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,3]]},"reference":[{"issue":"4","key":"18_CR1","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","volume":"14","author":"X Fang","year":"2011","unstructured":"Fang, X., Misra, S., Xue, G., Yang, D.: Smart grid-the new and improved power grid: a survey. IEEE Commun. Surv. Tutorials 14(4), 944\u2013980 (2011)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"18_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TII.2012.2218253","volume":"9","author":"VC Gungor","year":"2012","unstructured":"Gungor, V.C., et al.: A survey on smart grid potential applications and communication requirements. IEEE Trans. Indust. Inform. 9(1), 28\u201342 (2012)","journal-title":"IEEE Trans. Indust. Inform."},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"2589","DOI":"10.1016\/j.renene.2019.08.092","volume":"146","author":"G Dileep","year":"2020","unstructured":"Dileep, G.: A survey on smart grid technologies and applications. Renewable Energy 146, 2589\u20132625 (2020)","journal-title":"Renewable Energy"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3578366","volume":"7","author":"N Sahani","year":"2023","unstructured":"Sahani, N., Zhu, R., Cho, J.-H., Liu, C.-C.: Machine learning-based intrusion detection for smart grid computing: a survey. ACM Trans\/ Cyber-Phys. Syst. 7(2), 1\u201331 (2023)","journal-title":"ACM Trans\/ Cyber-Phys. Syst."},{"issue":"2","key":"18_CR5","doi-asserted-by":"publisher","first-page":"548","DOI":"10.3390\/smartcities4020029","volume":"4","author":"OA Omitaomu","year":"2021","unstructured":"Omitaomu, O.A., Niu, H.: Artificial intelligence techniques in smart grid: a survey. Smart Cities 4(2), 548\u2013568 (2021)","journal-title":"Smart Cities"},{"issue":"3","key":"18_CR6","first-page":"1","volume":"8","author":"F Ahsanet","year":"2023","unstructured":"Ahsanet, F., et al.: Data-driven next-generation smart grid towards sustainable energy evolution: techniques and technology review. Protect. Control Mod. Power Syst. 8(3), 1\u201342 (2023)","journal-title":"Protect. Control Mod. Power Syst."},{"issue":"11","key":"18_CR7","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1109\/TPDS.2012.61","volume":"24","author":"J Hur","year":"2013","unstructured":"Hur, J.: Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans. Parallel Distrib. Syst. 24(11), 2171\u20132180 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.eswa.2017.03.007","volume":"79","author":"JI Guerrero","year":"2017","unstructured":"Guerrero, J.I., Garc\u00eda, A., Personal, E., Luque, J., Le\u00f3n, C.: Heterogeneous data source integration for smart grid ecosystems based on metadata mining. Expert Syst. Appli. 79, 254\u2013268 (2017)","journal-title":"Expert Syst. Appli."},{"issue":"1","key":"18_CR9","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TII.2021.3074915","volume":"18","author":"MB Gough","year":"2021","unstructured":"Gough, M.B., Santos, S.F., AlSkaif, T., Javadi, M.S., Castro, R., Catal\u00e3o, J.: Preserving privacy of smart meter data in a smart grid environment. IEEE Trans. Indust. Inform. 18(1), 707\u2013718 (2021)","journal-title":"IEEE Trans. Indust. Inform."},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-49148-6_19","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"G Si","year":"2016","unstructured":"Si, G., Guan, Z., Li, J., Liu, P., Yao, H.: A comprehensive survey of privacy-preserving in smart grid. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 213\u2013223. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49148-6_19"},{"issue":"4","key":"18_CR11","first-page":"1","volume":"53","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Deng, R.H., Xu, S., Sun, J., Li, Q., Zheng, D.: Attribute-based encryption for cloud computing access control: a survey. ACM Comput. Surv. CSUR 53(4), 1\u201341 (2020)","journal-title":"ACM Comput. Surv. CSUR"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s12243-018-00699-y","volume":"74","author":"W Axin","year":"2019","unstructured":"Axin, W., Zhang, Y., Zheng, X., Guo, R., Zhao, Q., Zheng, D.: Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Annals Telecommun. 74, 401\u2013411 (2019)","journal-title":"Annals Telecommun."},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TSG.2011.2163807","volume":"2","author":"O Kosut","year":"2011","unstructured":"Kosut, O., Jia, L., Thomas, R.J., Tong, L.: Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2(4), 645\u2013658 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"14s","key":"18_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3592797","volume":"55","author":"HT Reda","year":"2023","unstructured":"Reda, H.T., Anwar, A., Mahmood, A.N., Tari, Z.: A taxonomy of cyber defence strategies against false data attacks in smart grids. ACM Comput. Surv. 55(14s), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"18_CR15","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","volume":"19","author":"D Han","year":"2020","unstructured":"Han, D., Pan, N., Li, K.-C.: A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans. Dependable Secure Comput. 19(1), 316\u2013327 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-319-98989-1_26","volume-title":"Computer Security","author":"J Lai","year":"2018","unstructured":"Lai, J., Tang, Q.: Making Any attribute-based encryption accountable, efficiently. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11099, pp. 527\u2013547. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98989-1_26"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1016\/j.future.2017.09.045","volume":"93","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Duan, S., Zhou, P., Wang, B.: Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Futur. Gener. Comput. Syst. 93, 903\u2013913 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"18_CR18","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G Wang","year":"2011","unstructured":"Wang, G., Liu, Q., Jie, W., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Sec. 30(5), 320\u2013331 (2011)","journal-title":"Comput. Sec."},{"issue":"06","key":"18_CR19","doi-asserted-by":"publisher","first-page":"3999","DOI":"10.1109\/TSC.2023.3303368","volume":"16","author":"D Ghopur","year":"2023","unstructured":"Ghopur, D., Ma, J., Ma, X., Hao, J., Jiang, T., Wang, X.: Puncturable key-policy attribute-based encryption scheme for efficient user revocation. IEEE Trans. Serv. Comput. 16(06), 3999\u20134011 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-662-53644-5_21","volume-title":"Theory of Cryptography","author":"I Damg\u00e5rd","year":"2016","unstructured":"Damg\u00e5rd, I., Haagh, H., Orlandi, C.: Access control encryption: enforcing information flow with cryptography. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9986, pp. 547\u2013576. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53644-5_21"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-92548-2_1","volume-title":"Cryptology and Network Security","author":"M Sedaghat","year":"2021","unstructured":"Sedaghat, M., Preneel, B.: Cross-domain attribute-based access control encryption. In: Conti, M., Stevens, M., Krenn, S. (eds.) CANS 2021. LNCS, vol. 13099, pp. 3\u201323. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92548-2_1"},{"issue":"3","key":"18_CR22","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1109\/TDSC.2021.3058132","volume":"19","author":"W Susilo","year":"2021","unstructured":"Susilo, W., Jiang, P., Lai, J., Guo, F., Yang, G., Deng, R.H.: Sanitizable access control system for secure cloud storage against malicious data publishers. IEEE Trans. Dependable Sec. Comput. 19(3), 2138\u20132148 (2021)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Siddiqui, F., Zeadally, S., Alcaraz, C., Galvao, S.: Smart grid privacy: issues and solutions. In: 2012 21st International Conference on Computer Communications and Networks, pp. 1\u20135. IEEE (2012)","DOI":"10.1109\/ICCCN.2012.6289304"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Nicanfar, H., Hosseininezhad, S., TalebiFard, P., Leung, V.C.M.: Robust privacy-preserving authentication scheme for communication between electric vehicle as power energy storage and power stations. In: 2013 Proceedings IEEE INFOCOM, pp. 3429\u20133434. IEEE (2013)","DOI":"10.1109\/INFCOM.2013.6567176"},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comcom.2016.06.006","volume":"91","author":"W Han","year":"2016","unstructured":"Han, W., Xiao, Y.: Privacy preservation for v2g networks in smart grid: a survey. Comput. Commun. 91, 17\u201328 (2016)","journal-title":"Comput. Commun."},{"issue":"12","key":"18_CR26","doi-asserted-by":"publisher","first-page":"3430","DOI":"10.1109\/TPDS.2022.3153930","volume":"33","author":"Y Zhan","year":"2022","unstructured":"Zhan, Y., Zhou, L., Wang, B., Duan, P., Zhang, B.: Efficient function queryable and privacy preserving data aggregation scheme in smart grid. IEEE Trans. Parallel Distrib. Syst. 33(12), 3430\u20133441 (2022)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"18_CR27","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3390\/electronics13010139","volume":"13","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Yang, Q., Yang, Y., Chen, S., Jinguang, G.: Data sharing scheme of smart grid based on identity condition proxy re-encryption. Electronics 13(1), 139 (2023)","journal-title":"Electronics"},{"issue":"2","key":"18_CR28","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/JIOT.2016.2561908","volume":"4","author":"KN Alharbi","year":"2016","unstructured":"Alharbi, K.N., Lin, X., Shao, J.: A privacy-preserving data-sharing framework for smart grid. IEEE Internet of Things J. 4(2), 555\u2013562 (2016)","journal-title":"IEEE Internet of Things J."},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-19379-8_6","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"N Attrapadung","year":"2011","unstructured":"Attrapadung, N., Libert, B., de Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90\u2013108. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_6"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, G., Liu, L., Liu, Y.: An attribute-based encryption scheme secure against malicious kgc. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1376\u20131380. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.74"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-319-27051-7_7","volume-title":"Cloud Computing and Security","author":"X Zhang","year":"2015","unstructured":"Zhang, X., Jin, C., Wen, Z., Shen, Q., Fang, Y., Wu, Z.: Attribute-based encryption without key escrow. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 74\u201387. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27051-7_7"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Meng, L., Chen, L., Tian, Y., Manulis, M.: Fabesa: Fast (and anonymous) attribute-based encryption under standard assumption. In: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (2024)","DOI":"10.1145\/3658644.3670321"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-4731-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T07:03:12Z","timestamp":1746428592000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-4731-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819647309","9789819647316"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-4731-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"3 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2024.github.io\/#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}