{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T03:38:02Z","timestamp":1648525082877},"reference-count":23,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1587\/transfun.2019cip0024","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T22:06:05Z","timestamp":1577829965000},"page":"183-194","source":"Crossref","is-referenced-by-count":0,"title":["Verifiable Privacy-Preserving Data Aggregation Protocols"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Satoshi","family":"YASUDA","sequence":"first","affiliation":[{"name":"Mitsubishi Electric"}]},{"given":"Yoshihiro","family":"KOSEKI","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric"}]},{"given":"Yusuke","family":"SAKAI","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Fuyuki","family":"KITAGAWA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"},{"name":"Tokyo Institute of Technology"}]},{"given":"Yutaka","family":"KAWAI","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric"}]},{"given":"Goichiro","family":"HANAOKA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S. Yasuda, Y. Koseki, Y. Sakai, F. Kitagawa, Y. Kawai, and G. Hanaoka, \u201cFormal treatment of verifiable privacy-preserving data-aggregation protocols,\u201d ProvSec, LNCS, vol.11192, pp.415-422, Springer, 2018. 10.1007\/978-3-030-01446-9_25","DOI":"10.1007\/978-3-030-01446-9_25"},{"key":"2","unstructured":"[2] \u201cThe smart grid interoperability panel-smart grid cybersecurity committee,\u201d NISTIR 7628 Rev.1: Guidelines for Smart Grid Cybersecurity, 2014. 10.6028\/nist.ir.7628r1"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] K. Ohara, Y. Sakai, F. Yoshida, M. Iwamoto, and K. Ohta, \u201cPrivacy-preserving smart metering with verifiability for both billing and energy management,\u201d AsiaPKC@AsiaCCS, pp.23-32, ACM, 2014. 10.1145\/2600694.2600700","DOI":"10.1145\/2600694.2600700"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] D. Boneh, D.M. Freeman, J. Katz, and B. Waters, \u201cSigning a linear subspace: Signature schemes for network coding,\u201d PKC, LNCS, vol.5443, pp.68-87, Springer, 2009. 10.1007\/978-3-642-00468-1_5","DOI":"10.1007\/978-3-642-00468-1_5"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] D.M. Freeman, \u201cImproved security for linearly homomorphic signatures: A generic framework,\u201d PKC, LNCS, vol.7293, pp.697-714, Springer, 2012. 10.1007\/978-3-642-30057-8_41","DOI":"10.1007\/978-3-642-30057-8_41"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] N. Attrapadung, B. Libert, and T. Peters, \u201cEfficient completely context-hiding quotable and linearly homomorphic signatures,\u201d PKC, LNCS, vol.7778, pp.386-404, Springer, 2013. 10.1007\/978-3-642-36362-7_24","DOI":"10.1007\/978-3-642-36362-7_24"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] S. Gorbunov, V. Vaikuntanathan, and D. Wichs, \u201cLeveled fully homomorphic signatures from standard lattices,\u201d STOC, pp.469-477, ACM, 2015. 10.1145\/2746539.2746576","DOI":"10.1145\/2746539.2746576"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] F. Wang, K. Wang, B. Li, and Y. Gao, \u201cLeveled strongly-unforgeable identity-based fully homomorphic signatures,\u201d ISC, LNCS, vol.9290, pp.42-60, Springer, 2015. 10.1007\/978-3-319-23318-5_3","DOI":"10.1007\/978-3-319-23318-5_3"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] J.H. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, and B. Waters, \u201cComputing on authenticated data,\u201d J. Cryptol., vol.28, no.2, pp.351-395, 2015. 10.1007\/s00145-014-9182-0","DOI":"10.1007\/s00145-014-9182-0"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] N. Attrapadung, B. Libert, and T. Peters, \u201cComputing on authenticated data: New privacy definitions and constructions,\u201d ASIACRYPT, LNCS, vol.7658, pp.367-385, Springer, 2012. 10.1007\/978-3-642-34961-4_23","DOI":"10.1007\/978-3-642-34961-4_23"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Jawurek, M. Johns, and F. Kerschbaum, \u201cPlug-in privacy for smart metering billing,\u201d PETS, LNCS, vol.6794, pp.192-210, Springer, 2011. 10.1007\/978-3-642-22263-4_11","DOI":"10.1007\/978-3-642-22263-4_11"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] A. Rial and G. Danezis, \u201cPrivacy-preserving smart metering,\u201d WPES, pp.49-60, ACM, 2011. 10.1145\/2046556.2046564","DOI":"10.1145\/2046556.2046564"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] G. Barthe, G. Danezis, B. Gr\u00e9goire, C. Kunz, and S.Z. B\u00e9guelin, \u201cVerified computational differential privacy with applications to smart metering,\u201d CSF, pp.287-301, IEEE Computer Society, 2013. 10.1109\/csf.2013.26","DOI":"10.1109\/CSF.2013.26"},{"key":"14","unstructured":"[14] S. Yamanaka, S. Ito, and Y. Komano \u201cPrivacy protection scheme for smart grid using homomorphic encryption and its demonstration system,\u201d IEICE Trans. Fundamentals (Japanese Edition), vol.J96-A, no.4 pp.184-188, April 2015."},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] G. Danezis, C. Fournet, M. Kohlweiss, and S.Z. B\u00e9guelin, \u201cSmart meter aggregation via secret-sharing,\u201d SEGS@CCS, pp.75-80, ACM, 2013. 10.1145\/2516930.2516944","DOI":"10.1145\/2516930.2516944"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] D. Fiore, R. Gennaro, and V. Pastro, \u201cEfficiently verifiable computation on encrypted data,\u201d ACM Conference on Computer and Communications Security, pp.844-855, ACM, 2014. 10.1145\/2660267.2660366","DOI":"10.1145\/2660267.2660366"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] J. Lai, R.H. Deng, H. Pang, and J. Weng, \u201cVerifiable computation on outsourced encrypted data,\u201d ESORICS (1), LNCS, vol.8712, pp.273-291, Springer, 2014. 10.1007\/978-3-319-11203-9_16","DOI":"10.1007\/978-3-319-11203-9_16"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] N.H. Tran, H. Pang, and R.H. Deng, \u201cEfficient verifiable computation of linear and quadratic functions over encrypted data,\u201d AsiaCCS, pp.605-616, ACM, 2016. 10.1145\/2897845.2897892","DOI":"10.1145\/2897845.2897892"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] A. El-Yahyaoui and M.D.E.E. Kettani, \u201cA verifiable fully homomorphic encryption scheme to secure big data in cloud computing,\u201d WINCOM, pp.1-5, IEEE, 2017. 10.1109\/wincom.2017.8238186","DOI":"10.1109\/WINCOM.2017.8238186"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] K. Emura, \u201cPrivacy-preserving aggregation of time-series data with public verifiability from simple assumptions,\u201d ACISP (2), LNCS, vol.10343, pp.193-213, Springer, 2017. 10.1007\/978-3-319-59870-3_11","DOI":"10.1007\/978-3-319-59870-3_11"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] I. Leontiadis, K. Elkhiyaoui, M. \u00d6nen, and R. Molva, \u201cPUDA \u2014 Privacy and unforgeability for data aggregation,\u201d CANS, LNCS, vol.9476, pp.3-18, Springer, 2015. 10.1007\/978-3-319-26823-1_1","DOI":"10.1007\/978-3-319-26823-1_1"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, \u201cStructure-preserving signatures and commitments to group elements,\u201d CRYPTO, LNCS, vol.6223, pp.209-236, Springer, 2010. 10.1007\/978-3-642-14623-7_12","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] T. El Gamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d CRYPTO, LNCS, vol.196, pp.10-18, Springer, 1985. 10.1007\/3-540-39568-7_2","DOI":"10.1007\/3-540-39568-7_2"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/1\/E103.A_2019CIP0024\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T05:25:31Z","timestamp":1578288331000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/1\/E103.A_2019CIP0024\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2019cip0024","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}