{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:35Z","timestamp":1750220255102,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1800088"],"award-info":[{"award-number":["1800088"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006282","name":"Federal Aviation Administration","doi-asserted-by":"publisher","award":["A38"],"award-info":[{"award-number":["A38"]}],"id":[{"id":"10.13039\/100006282","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3494107.3522775","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T16:36:10Z","timestamp":1652805370000},"page":"15-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Private and Secure Smart Meter Billing"],"prefix":"10.1145","author":[{"given":"Mohammed","family":"Ababneh","sequence":"first","affiliation":[{"name":"New Mexico State University, Las Cruces, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kartick","family":"Kolachala","sequence":"additional","affiliation":[{"name":"New Mexico State University, Las Cruces, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roopa","family":"Vishwanathan","sequence":"additional","affiliation":[{"name":"New Mexico State University, Las Cruces, NM, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2720195"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2412552"},{"key":"e_1_3_2_2_3_1","first-page":"2","volume-title":"Ipfs-content addressed, versioned","author":"Benet Juan","year":"2014","unstructured":"Juan Benet . 2014. Ipfs-content addressed, versioned , p 2 p file system. arXiv preprint arXiv:1407.3561 ( 2014 ). Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"volume-title":"Theory of cryptography conference","author":"Boneh Dan","key":"e_1_3_2_2_5_1","unstructured":"Dan Boneh , Eu-Jin Goh , and Kobbi Nissim . 2005. Evaluating 2-DNF formulas on ciphertexts . In Theory of cryptography conference . Springer , 325--341. Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. 2005. Evaluating 2-DNF formulas on ciphertexts. In Theory of cryptography conference. Springer, 325--341."},{"volume-title":"2013 IEEE 10th International Conference on High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing. 1622--1627","author":"Callegari C.","key":"e_1_3_2_2_6_1","unstructured":"C. Callegari , S. De Pietro , S. Giordano , M. Pagano , and G. Procissi . 2013. A Distributed Privacy-Aware Architecture for Communication in Smart Grids . In 2013 IEEE 10th International Conference on High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing. 1622--1627 . C. Callegari, S. De Pietro, S. Giordano, M. Pagano, and G. Procissi. 2013. A Distributed Privacy-Aware Architecture for Communication in Smart Grids. In 2013 IEEE 10th International Conference on High Performance Computing and Communications 2013 IEEE International Conference on Embedded and Ubiquitous Computing. 1622--1627."},{"key":"e_1_3_2_2_7_1","volume-title":"Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001","author":"Canetti Ran","year":"2001","unstructured":"Ran Canetti . 2001 . Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001 , 14--17 October 2001, Las Vegas, Nevada, USA. IEEE Computer Society, 136--145. Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, 14--17 October 2001, Las Vegas, Nevada, USA. IEEE Computer Society, 136--145."},{"key":"e_1_3_2_2_8_1","volume-title":"PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Networking and Applications 8 (03","author":"Chen Le","year":"2014","unstructured":"Le Chen , Rongxing Lu , and Zhenfu Cao . 2014 . PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Networking and Applications 8 (03 2014), 1122--1132. https:\/\/doi.org\/ 10.1007\/s12083-014-0255--5 10.1007\/s12083-014-0255--5 Le Chen, Rongxing Lu, and Zhenfu Cao. 2014. PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Networking and Applications 8 (03 2014), 1122--1132. https:\/\/doi.org\/ 10.1007\/s12083-014-0255--5"},{"key":"e_1_3_2_2_9_1","unstructured":"configuration [n.d.]. Pairing library. https:\/\/github.com\/dfaranha\/OpenPairing.  configuration [n.d.]. Pairing library. https:\/\/github.com\/dfaranha\/OpenPairing."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2358225"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2496211"},{"key":"e_1_3_2_2_12_1","unstructured":"Features of smart meter 2019. Features of smart meter. https:\/\/www.sciencedirect. com\/topics\/engineering\/smart-metering.  Features of smart meter 2019. Features of smart meter. https:\/\/www.sciencedirect. com\/topics\/engineering\/smart-metering."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2833863"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700401"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/AITC.2019.8920931"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055386.3055389"},{"key":"e_1_3_2_2_17_1","volume-title":"Privacy Preservation of Smart Meters Based on Identity Authentication. Energy and Power Engineering 12 (01","author":"Hu Hongbo","year":"2020","unstructured":"Hongbo Hu , Xin Zhao , Yalian Wu , Mengbiao Huang , Ziqi Zhu , and Qingyu Yang . 2020. Privacy Preservation of Smart Meters Based on Identity Authentication. Energy and Power Engineering 12 (01 2020 ), 53--62. https:\/\/doi.org\/10.4236\/epe. 2020.124B006 10.4236\/epe Hongbo Hu, Xin Zhao, Yalian Wu, Mengbiao Huang, Ziqi Zhu, and Qingyu Yang. 2020. Privacy Preservation of Smart Meters Based on Identity Authentication. Energy and Power Engineering 12 (01 2020), 53--62. https:\/\/doi.org\/10.4236\/epe. 2020.124B006"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_11"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the International Conference on Security and Cryptography. IEEE, 114--123","author":"Jeske Tobias","year":"2011","unstructured":"Tobias Jeske . 2011 . Privacy-preserving smart metering without a trusted-thirdparty . In Proceedings of the International Conference on Security and Cryptography. IEEE, 114--123 . Tobias Jeske. 2011. Privacy-preserving smart metering without a trusted-thirdparty. In Proceedings of the International Conference on Security and Cryptography. IEEE, 114--123."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2630803"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2809672"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007757"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2014.6901102"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2906016"},{"key":"e_1_3_2_2_26_1","unstructured":"Petlib Python library 2019. Petlib Python library. https:\/\/github.com\/gdanezis\/ petlib.  Petlib Python library 2019. Petlib Python library. https:\/\/github.com\/gdanezis\/ petlib."},{"key":"e_1_3_2_2_27_1","unstructured":"Pinata IPFS [n.d.]. Pinata IPFS. https:\/\/pinata.cloud\/  Pinata IPFS [n.d.]. Pinata IPFS. https:\/\/pinata.cloud\/"},{"key":"e_1_3_2_2_28_1","unstructured":"Python library 2019. Python library. https:\/\/pypi.org\/project\/cryptography\/.  Python library 2019. Python library. https:\/\/pypi.org\/project\/cryptography\/."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046564"},{"key":"e_1_3_2_2_30_1","volume-title":"Privacypreserving smart metering with multiple data Consumers. Computer Networks 57 (05","author":"Rottondi Cristina","year":"2013","unstructured":"Cristina Rottondi , Giacomo Verticale , and Antonio Capone . 2013. Privacypreserving smart metering with multiple data Consumers. Computer Networks 57 (05 2013 ), 1699--1713. https:\/\/doi.org\/10.1016\/j.comnet.2013.02.018 10.1016\/j.comnet.2013.02.018 Cristina Rottondi, Giacomo Verticale, and Antonio Capone. 2013. Privacypreserving smart metering with multiple data Consumers. Computer Networks 57 (05 2013), 1699--1713. https:\/\/doi.org\/10.1016\/j.comnet.2013.02.018"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996874"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_2_33_1","unstructured":"Smart Meter configuration [n.d.]. Smart Meter configuration. https:\/\/www. renesas.com\/us\/en\/document\/bro\/smart-meter-solutions-catalog?language=en  Smart Meter configuration [n.d.]. Smart Meter configuration. https:\/\/www. renesas.com\/us\/en\/document\/bro\/smart-meter-solutions-catalog?language=en"},{"key":"e_1_3_2_2_34_1","volume-title":"Publicly Verifiable Secret Sharing. In Advances in Cryptology - EUROCRYPT '96 (Lecture Notes in Computer Science","volume":"199","author":"Stadler Markus","year":"1996","unstructured":"Markus Stadler . 1996 . Publicly Verifiable Secret Sharing. In Advances in Cryptology - EUROCRYPT '96 (Lecture Notes in Computer Science , Vol. 1070), Ueli Maurer (Ed.). Springer-Verlag, 190-- 199 . Markus Stadler. 1996. Publicly Verifiable Secret Sharing. In Advances in Cryptology - EUROCRYPT '96 (Lecture Notes in Computer Science, Vol. 1070), Ueli Maurer (Ed.). Springer-Verlag, 190--199."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.031"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT45199.2020.9087730"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm47815.2020.9302976"},{"key":"e_1_3_2_2_38_1","volume-title":"Divide & Conquer: A Privacy Safeguarding Framework for the Smart Grid. In ICC 2021-IEEE International Conference on Communications. IEEE, 1--6.","author":"Wagh Gaurav","year":"2021","unstructured":"Gaurav S Wagh and Sumita Mishra . 2021 . Divide & Conquer: A Privacy Safeguarding Framework for the Smart Grid. In ICC 2021-IEEE International Conference on Communications. IEEE, 1--6. Gaurav SWagh and Sumita Mishra. 2021. Divide & Conquer: A Privacy Safeguarding Framework for the Smart Grid. In ICC 2021-IEEE International Conference on Communications. IEEE, 1--6."}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Nagasaki Japan","acronym":"ASIA CCS '22"},"container-title":["Proceedings of the 8th ACM on Cyber-Physical System Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3494107.3522775","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522775","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494107.3522775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:45Z","timestamp":1750188645000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494107.3522775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":38,"alternative-id":["10.1145\/3494107.3522775","10.1145\/3494107"],"URL":"https:\/\/doi.org\/10.1145\/3494107.3522775","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}