{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:46Z","timestamp":1750220446913,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:00:00Z","timestamp":1607040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,4]]},"DOI":"10.1145\/3444370.3444616","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T06:33:27Z","timestamp":1609828407000},"page":"477-483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain-based privacy protection scheme for electric energy metering data"],"prefix":"10.1145","author":[{"given":"Tao","family":"Liu","sequence":"first","affiliation":[{"name":"Shenzhen Power Supply Bureau Co.Ltd, Shenzhen Guangdong, China"}]},{"given":"Xiaohong","family":"Cao","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Co.Ltd, Shenzhen Guangdong, China"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Teleommunications, Beijing, China"}]},{"given":"Shaocheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Co.Ltd, Shenzhen Guangdong, China"}]},{"given":"Xiaowei","family":"Chen","sequence":"additional","affiliation":[{"name":"Shenzhen Power Supply Bureau Co.Ltd, Shenzhen Guangdong, China"}]},{"given":"Yueming","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"issue":"11","key":"e_1_3_2_1_1_1","first-page":"67","article-title":"Modeling and realization of electric energy collection terminal in substation based on IEC 61850[J]","volume":"34","author":"Jianmin Zhang","year":"2010","unstructured":"Zhang Jianmin , Jiang Shiting , Jin Naizheng , Jin Shan , Zhang Lizong . Modeling and realization of electric energy collection terminal in substation based on IEC 61850[J] . Automation of Electric Power Systems , 2010 , 34 ( 11 ): 67 -- 71 . Zhang Jianmin, Jiang Shiting, Jin Naizheng, Jin Shan, Zhang Lizong. Modeling and realization of electric energy collection terminal in substation based on IEC 61850[J]. Automation of Electric Power Systems, 2010, 34(11): 67--71.","journal-title":"Automation of Electric Power Systems"},{"key":"e_1_3_2_1_2_1","volume-title":"Overview of privacy protection technologies for smart meters[J]","author":"Xiuxia Tian","year":"2015","unstructured":"Tian Xiuxia , Li Lisha , Sun Chaochao , Liu Daming . Overview of privacy protection technologies for smart meters[J] . Journal of East China Normal University (Natural Science Edition) , 2015 (05): 46--60. Tian Xiuxia, Li Lisha, Sun Chaochao, Liu Daming. Overview of privacy protection technologies for smart meters[J]. Journal of East China Normal University (Natural Science Edition), 2015(05): 46--60."},{"issue":"03","key":"e_1_3_2_1_3_1","first-page":"118","article-title":"Certificate-free ring signcryption scheme to protect user privacy under smart grid [J]","volume":"42","author":"Shaomin Zhang","year":"2018","unstructured":"Zhang Shaomin , Zhao Yiqiao , Wang Baoyi . Certificate-free ring signcryption scheme to protect user privacy under smart grid [J] . Automation of Electric Power Systems , 2018 , 42 ( 03 ): 118 -- 123 +135. Zhang Shaomin, Zhao Yiqiao, Wang Baoyi. Certificate-free ring signcryption scheme to protect user privacy under smart grid [J]. Automation of Electric Power Systems, 2018, 42(03): 118--123+135.","journal-title":"Automation of Electric Power Systems"},{"issue":"02","key":"e_1_3_2_1_4_1","first-page":"350","article-title":"Smart grid data security aggregation scheme supporting third-party arbitration [J]","volume":"48","author":"Yong Ding","year":"2020","unstructured":"Ding Yong , Wang Bingyao , Yuan Fang , Wang Yujue , Zhang Kun , Tian Lei . Smart grid data security aggregation scheme supporting third-party arbitration [J] . Chinese Journal of Electronics , 2020 , 48 ( 02 ): 350 -- 358 . Ding Yong, Wang Bingyao, Yuan Fang, Wang Yujue, Zhang Kun, Tian Lei. Smart grid data security aggregation scheme supporting third-party arbitration [J]. Chinese Journal of Electronics, 2020, 48(02): 350--358.","journal-title":"Chinese Journal of Electronics"},{"issue":"09","key":"e_1_3_2_1_5_1","first-page":"83","article-title":"Research on data encryption and signature in smart grid [J]","volume":"36","author":"Shichun Chn","year":"2020","unstructured":"Chn Shichun , Zhang Jiemin , Ni Wenwen , Li Jinhu , Lin Haiyu , Li Jianping . Research on data encryption and signature in smart grid [J] . Microcomputer Applications , 2020 , 36 ( 09 ): 83 -- 85 +100. Chn Shichun, Zhang Jiemin, Ni Wenwen, Li Jinhu, Lin Haiyu, Li Jianping. Research on data encryption and signature in smart grid [J]. Microcomputer Applications, 2020, 36(09): 83--85+100.","journal-title":"Microcomputer Applications"},{"key":"e_1_3_2_1_6_1","first-page":"0810","article-title":"Design of a secure storage platform for charging transaction data based on blockchain[J\/OL]. Computer Engineering and Applications: 1--9[2020-10-27].http:\/\/kns.cnki.net\/kcms\/detail\/11.2127.","author":"Mengte Li","year":"2020","unstructured":"Li Mengte , Gu Chunhua , Wen Mi . Design of a secure storage platform for charging transaction data based on blockchain[J\/OL]. Computer Engineering and Applications: 1--9[2020-10-27].http:\/\/kns.cnki.net\/kcms\/detail\/11.2127. TP. 2020 0810 .1352.006.html. Li Mengte, Gu Chunhua, Wen Mi. Design of a secure storage platform for charging transaction data based on blockchain[J\/OL]. Computer Engineering and Applications: 1--9[2020-10-27].http:\/\/kns.cnki.net\/kcms\/detail\/11.2127.TP.20200810.1352.006.html.","journal-title":"TP."},{"issue":"16","key":"e_1_3_2_1_7_1","first-page":"135","article-title":"Threshold secret sharing scheme based on ElGamal system[J]","volume":"36","author":"Tiancheng Wang","year":"2010","unstructured":"Wang Tiancheng , Zhang Jianzhong . Threshold secret sharing scheme based on ElGamal system[J] . Computer Engineering , 2010 , 36 ( 16 ): 135 -- 136 . Wang Tiancheng, Zhang Jianzhong. Threshold secret sharing scheme based on ElGamal system[J]. Computer Engineering, 2010, 36(16): 135--136.","journal-title":"Computer Engineering"},{"issue":"05","key":"e_1_3_2_1_8_1","first-page":"1097","article-title":"A privacy protection data aggregation protocol for smart grid [J]","volume":"37","author":"Yong Yu","year":"2016","unstructured":"Yu Yong , Ye Yun , Huang Liusheng , Lin Weimin , Hu Jie , Gao Peng , Li Nige . A privacy protection data aggregation protocol for smart grid [J] . Small and Micro Computer System , 2016 , 37 ( 05 ): 1097 -- 1101 . Yu Yong, Ye Yun, Huang Liusheng, Lin Weimin, Hu Jie, Gao Peng, Li Nige. A privacy protection data aggregation protocol for smart grid [J]. Small and Micro Computer System, 2016, 37(05):1097--1101.","journal-title":"Small and Micro Computer System"},{"issue":"12","key":"e_1_3_2_1_9_1","first-page":"83","article-title":"Research on classification of data aggregation schemes in smart grid [J]","volume":"55","author":"Sijia Zhang","year":"2019","unstructured":"Zhang Sijia , Gu Chunhua , Wen Mi . Research on classification of data aggregation schemes in smart grid [J] . Computer Engineering and Applications , 2019 , 55 ( 12 ): 83 -- 89 +154. Zhang Sijia, Gu Chunhua, Wen Mi. Research on classification of data aggregation schemes in smart grid [J]. Computer Engineering and Applications, 2019, 55(12): 83--89+154.","journal-title":"Computer Engineering and Applications"}],"event":{"name":"CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies","sponsor":["Sun Yat-Sen University","CARLETON UNIVERSITY INSTITUTE FOR INTERDISCIPLINARY STUDIES","Beijing University of Posts and Telecommunications","Guangdong University of Technology Guangdong University of Technology","Deakin University"],"location":"Guangzhou China","acronym":"CIAT 2020"},"container-title":["Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444616","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3444370.3444616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:44Z","timestamp":1750193264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":9,"alternative-id":["10.1145\/3444370.3444616","10.1145\/3444370"],"URL":"https:\/\/doi.org\/10.1145\/3444370.3444616","relation":{},"subject":[],"published":{"date-parts":[[2020,12,4]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}