{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:12:34Z","timestamp":1774541554034,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T00:00:00Z","timestamp":1547164800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11432-018-9451-y","type":"journal-article","created":{"date-parts":[[2019,1,15]],"date-time":"2019-01-15T08:09:43Z","timestamp":1547539783000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":129,"title":["EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid"],"prefix":"10.1007","volume":"62","author":[{"given":"Zhitao","family":"Guan","sequence":"first","affiliation":[]},{"given":"Yue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Longfei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,11]]},"reference":[{"key":"9451_CR1","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1109\/TSG.2017.2670144","volume":"8","author":"K Wang","year":"2017","unstructured":"Wang K, Du M, Maharjan S, et al. Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans Smart Grid, 2017, 8: 2474\u20132482","journal-title":"IEEE Trans Smart Grid"},{"key":"9451_CR2","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCOM.2018.1700401","volume":"56","author":"Z T Guan","year":"2018","unstructured":"Guan Z T, Si G L, Zhang X S, et al. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag, 2018, 56: 82\u201388","journal-title":"IEEE Commun Mag"},{"key":"9451_CR3","doi-asserted-by":"publisher","first-page":"1596","DOI":"10.1109\/TIFS.2017.2675864","volume":"12","author":"K P Xue","year":"2017","unstructured":"Xue K P, Li S H, Hong J N, et al. Two-cloud secure database for numeric-related sql range queries with privacy preserving. IEEE Trans Inf Foren Sec, 2017, 12: 1596\u20131608","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"9451_CR4","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1007\/s12083-014-0286-y","volume":"8","author":"J Wu","year":"2015","unstructured":"Wu J, Dong M X, Ota K, et al. Securing distributed storage for social internet of things using regenerating code and blom key agreement. Peer-to-Peer Netw Appl, 2015, 8: 1133\u20131142","journal-title":"Peer-to-Peer Netw Appl"},{"key":"9451_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2012.2228343","volume":"30","author":"Z Erkin","year":"2013","unstructured":"Erkin Z, Troncoso-Pastoriza J, Lagendijk R, et al. Privacy-preserving data aggregation in smart metering systems: an overview. IEEE Signal Proc Mag, 2013, 30: 75\u201386","journal-title":"IEEE Signal Proc Mag"},{"key":"9451_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/SURV.2012.021312.00034","volume":"15","author":"Y Yan","year":"2013","unstructured":"Yan Y, Qian Y, Sharif H, et al. A survey on smart grid communication infrastructures: motivations, requirements and challenges. IEEE Commun Surv Tut, 2013, 15: 5\u201320","journal-title":"IEEE Commun Surv Tut"},{"key":"9451_CR7","first-page":"914","volume-title":"Proceedings of^IEEE International Conference on Smart Grid Communications","author":"S Cho","year":"2014","unstructured":"Cho S, Li H, Choi B J. Palda: efficient privacy-preserving authentication for lossless data aggregation in smart grids. In: Proceedings of IEEE International Conference on Smart Grid Communications, 2014. 914\u2013919"},{"key":"9451_CR8","doi-asserted-by":"publisher","first-page":"3216","DOI":"10.1109\/TII.2017.2706760","volume":"13","author":"Z T Guan","year":"2017","unstructured":"Guan Z T, Li J, Zhu L H, et al. Toward delay-tolerant flexible data access control for smart grid with renewable energy resources. IEEE Trans Ind Inform, 2017, 13: 3216\u20133225","journal-title":"IEEE Trans Ind Inform"},{"key":"9451_CR9","doi-asserted-by":"publisher","first-page":"048103","DOI":"10.1007\/s11432-017-9212-2","volume":"61","author":"J M Zheng","year":"2018","unstructured":"Zheng J M, Tan Y A, Zhang Q K, et al. Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci, 2018, 61: 048103","journal-title":"Sci China Inf Sci"},{"key":"9451_CR10","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/JIOT.2017.2690522","volume":"4","author":"Z T Guan","year":"2017","unstructured":"Guan Z T, Li J, Wu L F, et al. Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Int Thing J, 2017, 4: 1934\u20131944","journal-title":"IEEE Int Thing J"},{"key":"9451_CR11","first-page":"619","volume":"8","author":"Z J Zhang","year":"2016","unstructured":"Zhang Z J, Qin Z, Zhu L H, et al. Cost-friendly differential privacy for smart meters: exploiting the dual roles of the noise. IEEE Trans Smart Grid, 2016, 8: 619\u2013626","journal-title":"IEEE Trans Smart Grid"},{"key":"9451_CR12","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/TII.2017.2721542","volume":"14","author":"S H Li","year":"2018","unstructured":"Li S H, Xue K P, Yang Q Y, et al. PPMA: privacy-preserving multisubset data aggregation in smart grid. IEEE Trans Ind Inf, 2018, 14: 462\u2013471","journal-title":"IEEE Trans Ind Inf"},{"key":"9451_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/CC.2018.8357698","volume":"15","author":"S H Li","year":"2018","unstructured":"Li S H, Zhang X, Xue K P, et al. Privacy-preserving prepayment based power request and trading in smart grid. China Commun, 2018, 15: 14\u201327","journal-title":"China Commun"},{"key":"9451_CR14","volume-title":"J Amb Intel Hum Comp","author":"Y Xiao","year":"2018","unstructured":"Xiao Y, Tan Y A, Sun Z Z, et al. A fault-tolerant and energy-efficient continuous data protection system. J Amb Intel Hum Comp, 2018. doi: 10.1007\/s12652-018-0726-2"},{"key":"9451_CR15","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/958491.958521","volume-title":"Proceedings of the 1st International Conference on Embedded Networked Sensor Systems","author":"B Przydatek","year":"2003","unstructured":"Przydatek B, Song D, Perrig A. Sia: secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003. 255\u2013265"},{"key":"9451_CR16","volume-title":"Privacy-preserving aggregation of time-series data","author":"E Shi","year":"2011","unstructured":"Shi E, Chan T H, Rieffel E, et al. Privacy-preserving aggregation of time-series data. In: Proceedings of the 18th Annual Network and Distributed System Security Conference, 2011"},{"key":"9451_CR17","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1109\/JCN.2012.00026","volume":"14","author":"Y S Kim","year":"2012","unstructured":"Kim Y S, Heo J. Device authentication protocol for smart grid systems using homomorphic Hash. J Commun Netw, 2012, 14: 606\u2013613","journal-title":"J Commun Netw"},{"key":"9451_CR18","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R X Lu","year":"2012","unstructured":"Lu R X, Liang X H, Li X, et al. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Paral Distrib Syst, 2012, 23: 1621\u2013163","journal-title":"IEEE Trans Paral Distrib Syst"},{"key":"9451_CR19","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1007\/s12083-014-0255-5","volume":"8","author":"L Chen","year":"2015","unstructured":"Chen L, Lu R X, Cao Z F. Pdaft: a privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer Peer Netw Appl, 2015, 8: 1122\u20131132","journal-title":"Peer Peer Netw Appl"},{"key":"9451_CR20","doi-asserted-by":"publisher","first-page":"2856","DOI":"10.1109\/TSG.2015.2443011","volume":"6","author":"Z G Shi","year":"2015","unstructured":"Shi Z G, Sun R X, Lu R X, et al. Diverse grouping-based aggregation protocol with error detection for smart grid communications. IEEE Trans Smart Grid, 2015, 6: 2856\u20132868","journal-title":"IEEE Trans Smart Grid"},{"key":"9451_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNSM.2018.2799000","volume":"15","author":"J Wu","year":"2018","unstructured":"Wu J, Dong M X, Ota K, et al. Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans Netw Serv Manage, 2018, 15: 27\u201338","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"9451_CR22","doi-asserted-by":"publisher","first-page":"2393","DOI":"10.1007\/s10586-016-0721-3","volume":"20","author":"X S Zhang","year":"2017","unstructured":"Zhang X S, Tan Y A, Xue Y, et al. Cryptographic key protection against FROST for mobile devices. Cluster Comput, 2017, 20: 2393\u20132402","journal-title":"Cluster Comput"},{"key":"9451_CR23","doi-asserted-by":"publisher","first-page":"119103","DOI":"10.1007\/s11432-017-9222-7","volume":"60","author":"S Gao","year":"2017","unstructured":"Gao S, Ma X D, Zhu J M, et al. APRS: a privacy-preserving location-aware recommender system based on differentially private histogram. Sci China Inf Sci, 2017, 60: 119103","journal-title":"Sci China Inf Sci"},{"key":"9451_CR24","doi-asserted-by":"publisher","first-page":"2828","DOI":"10.1109\/ACCESS.2015.2506198","volume":"3","author":"M A Mustafa","year":"2016","unstructured":"Mustafa M A, Zhang N, Kalogridis G, et al. Dep2sa: a decentralized efficient privacy-preserving and selective aggregation scheme in advanced metering infrastructure. IEEE Access, 2016, 3: 2828\u20132846","journal-title":"IEEE Access"},{"key":"9451_CR25","doi-asserted-by":"publisher","first-page":"7692","DOI":"10.1109\/ACCESS.2017.2698078","volume":"5","author":"T Wang","year":"2017","unstructured":"Wang T, Zeng J D, Bhuiyan M Z A, et al. Trajectory privacy preservation based on a fog structure for cloud location services. IEEE Access, 2017, 5: 7692\u20137701","journal-title":"IEEE Access"},{"key":"9451_CR26","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1109\/TIFS.2017.2656475","volume":"12","author":"H Shen","year":"2017","unstructured":"Shen H, Zhang M W, Shen J. Efficient privacy-preserving cube-data aggregation scheme for smart grids. IEEE Trans Inf Foren Secur, 2017, 12: 1369\u20131381","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"9451_CR27","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","volume":"2","author":"M M Fouda","year":"2011","unstructured":"Fouda M M, Fadlullah Z M, Kato N, et al. A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid, 2011, 2: 675\u2013685","journal-title":"IEEE Trans Smart Grid"},{"key":"9451_CR28","first-page":"223","volume-title":"Proceedings of International Conference on Theory and Application of Cryptographic Techniques","author":"P Paillier","year":"1999","unstructured":"Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on Theory and Application of Cryptographic Techniques, 1999. 223\u2013238"},{"key":"9451_CR29","first-page":"313","volume-title":"Proceeding of International Workshop on Managing Requirements Knowledge","author":"G R Blakley","year":"1979","unstructured":"Blakley G R. Safeguarding cryptographic keys. In: Proceeding of International Workshop on Managing Requirements Knowledge, 1979. 313\u2013317"},{"key":"9451_CR30","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.future.2016.02.003","volume":"62","author":"Y Yu","year":"2016","unstructured":"Yu Y, Xue L, Au M H, et al. Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener Comput Syst, 2016, 62: 85\u201391","journal-title":"Future Gener Comput Syst"},{"key":"9451_CR31","first-page":"236","volume-title":"Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques","author":"M Bellare","year":"1998","unstructured":"Bellare M, Garay J A, Rabin T. Fast batch verification for modular exponentiation and digital signatures. In: Proceeding of International Conference on the Theory and Applications of Cryptographic Techniques, 1998. 236\u2013250"},{"key":"9451_CR32","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","volume":"25","author":"H W Li","year":"2014","unstructured":"Li H W, Lin X D, Yang H M, et al. EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Paral Distrib Syst, 2014, 25: 2053\u20132064","journal-title":"IEEE Trans Paral Distrib Syst"},{"key":"9451_CR33","first-page":"514","volume-title":"Proceeding of International Conference on the Theory and Application of Cryptology and Information Security","author":"B Dan","year":"2001","unstructured":"Dan B, Lynn B, Shacham H. Short signatures from the weil pairing. In: Proceeding of International Conference on the Theory and Application of Cryptology and Information Security, 2001. 514\u2013532"},{"key":"9451_CR34","volume-title":"Privacy preserving processing of biometric templates by homomorphic encryption","author":"P Failla","year":"2011","unstructured":"Failla P. Privacy preserving processing of biometric templates by homomorphic encryption. Dissertation for Ph.D. Degree. Siena: University of Siena, 2011"},{"key":"9451_CR35","volume-title":"PBC: the pairing-based cryptography library. Version 0.5.14","author":"B Lynn","year":"2013","unstructured":"Lynn B. PBC: the pairing-based cryptography library. Version 0.5.14, 2013. http:\/\/crypto.stanford.edu\/pbc\/"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-018-9451-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9451-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9451-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,11]],"date-time":"2020-01-11T00:12:46Z","timestamp":1578701566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-018-9451-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,11]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["9451"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9451-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,11]]},"assertion":[{"value":"27 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"32103"}}