{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T06:31:30Z","timestamp":1769754690693,"version":"3.49.0"},"reference-count":30,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T00:00:00Z","timestamp":1606953600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872051"],"award-info":[{"award-number":["61872051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702067"],"award-info":[{"award-number":["61702067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["cstc2020jcyj-msxmX0343"],"award-info":[{"award-number":["cstc2020jcyj-msxmX0343"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["CX2018122"],"award-info":[{"award-number":["CX2018122"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["61872051"],"award-info":[{"award-number":["61872051"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["61702067"],"award-info":[{"award-number":["61702067"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["cstc2020jcyj-msxmX0343"],"award-info":[{"award-number":["cstc2020jcyj-msxmX0343"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["CX2018122"],"award-info":[{"award-number":["CX2018122"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Venture & Innovation Support Program for Chongqing Overseas Returnees","award":["61872051"],"award-info":[{"award-number":["61872051"]}]},{"name":"Venture & Innovation Support Program for Chongqing Overseas Returnees","award":["61702067"],"award-info":[{"award-number":["61702067"]}]},{"name":"Venture & Innovation Support Program for Chongqing Overseas Returnees","award":["cstc2020jcyj-msxmX0343"],"award-info":[{"award-number":["cstc2020jcyj-msxmX0343"]}]},{"name":"Venture & Innovation Support Program for Chongqing Overseas Returnees","award":["CX2018122"],"award-info":[{"award-number":["CX2018122"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,3]]},"abstract":"<jats:p>In a smart grid, data aggregation is a common method to evaluate regional power consumption. Data leakage in the process of data transmission poses a security threat to the privacy of users. Many existing data aggregation schemes can only aggregate one-dimensional data; however, it is necessary to aggregate multidimensional data in practical smart grid applications. Therefore, this paper proposes a privacy-preserving multidimensional data aggregation scheme, which can aggregate multidimensional data and protect the individual user\u2019s identity and data privacy. The security of the proposed scheme is proved under the random oracle model. The simulation results show that the proposed scheme has great advantages in computing overhead, and the communication overhead also meets the requirements of the smart grid.<\/jats:p>","DOI":"10.1155\/2020\/8845959","type":"journal-article","created":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T20:20:07Z","timestamp":1607026807000},"page":"1-14","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4116-6608","authenticated-orcid":true,"given":"Yousheng","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"},{"name":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4414-0964","authenticated-orcid":true,"given":"Xinyun","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5809-5044","authenticated-orcid":true,"given":"Meihuan","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"}]}],"member":"311","reference":[{"key":"1","unstructured":"DOE USGrid 2030: a national vision for electricity\u2019s second 100 years2003Washington, DC, USADOE US137140US DOE Report"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2014.6724103"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2015.2414719"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2014.2320093"},{"issue":"5","key":"5","first-page":"46","article-title":"Review on privacy protection approaches in smart meter","volume":"2015","author":"X. Tian","year":"2015","journal-title":"Journal of East China Normal University (Natural Science)"},{"key":"6","first-page":"325","article-title":"Evaluating 2-DNF formulas on ciphertexts","author":"D. Boneh"},{"key":"7","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","author":"P. Paillier"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1987-0866109-5"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0292-0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.3390\/s140406701"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2015.2412552"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2018.04.009"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2015.2449278"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.124"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2017.272045"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1188"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1002\/sec.761"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2016.2553647"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2013.2277938"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2015.2500882"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2017.2720159"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3194845"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.025"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"25","first-page":"1107","article-title":"PMDA: privacy-preserving multi-functional data aggregation without TTP in smart grid","author":"Z. He"},{"issue":"3","key":"26","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","article-title":"A practical privacy-preserving data aggregation (3PDA) scheme for smart grid","volume":"15","author":"Y. Liu","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2017.2721542"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2656475"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.03.008"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8845959.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8845959.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8845959.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T20:20:37Z","timestamp":1607026837000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8845959\/"}},"subtitle":[],"editor":[{"given":"Luxing","family":"Yang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,3]]},"references-count":30,"alternative-id":["8845959","8845959"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8845959","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,12,3]]}}}