{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T09:02:10Z","timestamp":1774083730641,"version":"3.50.1"},"reference-count":40,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T00:00:00Z","timestamp":1650326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Science and Technology on Communication Security Lab","award":["6142103010710"],"award-info":[{"award-number":["6142103010710"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Smart grids integrate modern Internet of Things technologies with the traditional grid systems, aiming to achieve effective and reliable electricity distribution as well as promote clean energy development. Nowadays, it is an indispensable infrastructure for smart homes, wisdom medical, intelligent transportation, and various other services. However, when smart meters transmit users\u2019 power consumption data to the control center, sensitive information may be leaked or tampered. Moreover, distributed architecture, fine-grained access control, and user anonymity are also desirable in real-world applications. In this paper, we propose a privacy-preserving data aggregation scheme for a smart grid with user anonymity and designated recipients. Smart meters collect users\u2019 power consumption data, encrypt it using homomorphic re-encryption, and then transmit the ciphertexts anonymously. Afterward, proxies re-encrypt the aggregated data in a distributed fashion so that only the designated recipients can decrypt it. Therefore, our proposed scheme provides a more secure and flexible solution for privacy-preserving data aggregation in smart grids. Security analyses prove that our scheme achieves all the above-mentioned security requirements, and efficiency analyses demonstrate that it is efficient and suitable for real-world applications.<\/jats:p>","DOI":"10.3390\/sym14050847","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:22:43Z","timestamp":1650414163000},"page":"847","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients"],"prefix":"10.3390","volume":"14","author":[{"given":"Liang","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan 430070, China"}]},{"given":"Wenzheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610000, China"}]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Security Laboratory, Chengdu 610000, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,4,19]]},"reference":[{"key":"ref_1","first-page":"674","article-title":"Discussion on megalopolis power grid safety from the perspective of Venezuelan blackout","volume":"40","author":"Fang","year":"2019","journal-title":"Power Energy"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Gao, K., Han, F., Dong, P., Xiong, N., and Du, R. (2019). Connected vehicle as a mobile sensor for real time queue length at signalized intersections. Sensors, 19.","DOI":"10.3390\/s19092059"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1109\/JPROC.2011.2125930","article-title":"Challenges and Opportunities in Smart Grid: A Position Article","volume":"99","author":"Arnold","year":"2011","journal-title":"Proc. IEEE."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MPE.2009.934876","article-title":"The path of the smart grid","volume":"8","author":"Farhangi","year":"2010","journal-title":"IEEE Power Energy Mag."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"012062","DOI":"10.1088\/1757-899X\/199\/1\/012062","article-title":"A Review on Development Practice of Smart Grid Technology in China","volume":"199","author":"Liu","year":"2017","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_6","unstructured":"Northcotegreen, J. (2007). Control and Automation of Electrical Power Distribution Systems, CRC Press."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"113102","DOI":"10.1016\/j.enconman.2020.113102","article-title":"Solving the duck curve in a smart grid environment using a non-cooperative game theory and dynamic pricing profiles","volume":"220","author":"Sheha","year":"2020","journal-title":"Energy Convers. Manag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.ins.2020.03.107","article-title":"An efficient aggregation scheme resisting on malicious data mining attacks for smart grid","volume":"526","author":"Shen","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","article-title":"Data security and privacy protection for cloud storage: A survey","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/MNET.011.1900573","article-title":"An energy trade framework using smart contracts: Overview and challenges","volume":"34","author":"Aloqaily","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3745","DOI":"10.1109\/TII.2018.2826226","article-title":"A resilient architecture for the smart grid","volume":"14","author":"Lopez","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Serrano, D., Ru\u00edz, J.F., Mu\u00f1oz, A., Ma\u00f1a, A., Armenteros, A., and Crespo, B.G.N. (2009, January 18\u201323). Development of applications based on security patterns. Proceedings of the 2009 Second International Conference on Dependability, Athens, Greece.","DOI":"10.1109\/DEPEND.2009.23"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez-Cid, F., Mana, A., Spanoudakis, G., Kloukinas, C., Serrano, D., and Munoz, A. (2009). Representation of security and dependability solutions. Security and Dependability for Ambient Intelligence, Springer.","DOI":"10.1007\/978-0-387-88775-3_5"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1109\/TII.2017.2721542","article-title":"PPMA: Privacy-preserving multi-subset aggregation in smart grid","volume":"14","author":"Li","year":"2018","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4016","DOI":"10.1109\/JIOT.2020.2978286","article-title":"LVPDA: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT","volume":"7","author":"Zhang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6607","DOI":"10.1109\/TII.2020.2965578","article-title":"Secure metering data aggregation with batch verification in industrial smart grid","volume":"16","author":"Ding","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Paillier, P. (1999). Public-key cryptosystems based on composite degree residuosity classes. International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","article-title":"EPPA: An efficient and privacy preserving aggregation scheme for secure smart grid communications","volume":"23","author":"Lu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3083","DOI":"10.1109\/JIOT.2020.2965065","article-title":"A lightweight privacy-preserving fair meeting location determination scheme","volume":"7","author":"Shen","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.ins.2017.05.004","article-title":"Encrypted data processing with homomorphic re-encryption","volume":"409","author":"Ding","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"32103","DOI":"10.1007\/s11432-018-9451-y","article-title":"EFFECT: An efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid","volume":"62","author":"Guan","year":"2019","journal-title":"Sci. China Inf. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","article-title":"EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid","volume":"25","author":"Li","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"10830","DOI":"10.1109\/JIOT.2021.3051060","article-title":"A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1109\/JSYST.2020.2991928","article-title":"PPO-DFK a privacy-preserving optimization of distributed fractional knapsack with application in secure footballer configurations","volume":"15","author":"Zhang","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/TII.2018.2809672","article-title":"A practical privacy-preserving data aggregation (3pda) scheme for smart grid","volume":"15","author":"Liu","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1949","DOI":"10.1109\/JIOT.2019.2961966","article-title":"An efficient and robust data aggregation scheme without a trusted authority for smart grid","volume":"7","author":"Xue","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/TIFS.2020.3014487","article-title":"Smart and practical privacy-preserving data aggregation for fog-based smart grids","volume":"16","author":"Zhao","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"15639","DOI":"10.1109\/JIOT.2021.3074503","article-title":"LCEDA: Lightweight and Communication-Efficient Data Aggregation Scheme for Smart Grid","volume":"8","author":"Su","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3495","DOI":"10.1007\/s10586-021-03345-w","article-title":"A lightweight and fault-tolerable data aggregation scheme for privacy-friendly smart grids environment","volume":"24","author":"Huang","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.future.2020.04.021","article-title":"Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN","volume":"111","author":"Xu","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1504\/IJAHUC.2016.077203","article-title":"Pseudonym-based privacy-preserving scheme for data collection in smart grid","volume":"22","author":"Tan","year":"2016","journal-title":"Int. J. Hoc Ubiquitous Comput."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.2018.1700401","article-title":"Privacy-preserving and Efficient Aggregation based on Blockchain for Power Grid Communications in Smart Communities","volume":"56","author":"Guan","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1002\/sec.761","article-title":"An anonymous data aggregation scheme for smart grid systems","volume":"7","author":"Liu","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Sui, Z., Alyousef, A., and de Meer, H. (2015). IAA: Incentive-based anonymous authentication scheme in smart grids. International Conference on Internet Science, Springer.","DOI":"10.1007\/978-3-319-18609-2_11"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/JSYST.2013.2260680","article-title":"Privacy-preserving power request in smart grid networks","volume":"8","author":"Yu","year":"2013","journal-title":"IEEE Syst. J."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Cheung, J., Chim, T., Yiu, S., and Hui, L. (2011, January 5\u20139). Credential-Based Privacy-Preserving Power Request Scheme for Smart Grid Network. Proceedings of the IEEE Global Telecommunications Conference, Houston, TX, USA.","DOI":"10.1109\/GLOCOM.2011.6134566"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1860","DOI":"10.1109\/TIFS.2013.2277471","article-title":"b-SPECS+: Batch verification for secure pseudonymous authentication in VANET","volume":"8","author":"Hornget","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Bresson, E., Catalano, D., and Pointcheval, D. (2003). A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. Advances in Cryptology-ASIACRYPT, Springer.","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/TIFS.2017.2656475","article-title":"Efficient privacy-preserving cube-data aggregation scheme for smart grids","volume":"12","author":"Shen","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1109\/TSG.2015.2449278","article-title":"Efficient and Privacy-Preserving Metering Protocols for Smart Grid Systems","volume":"7","author":"Jo","year":"2016","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/5\/847\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:56:44Z","timestamp":1760137004000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/14\/5\/847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,19]]},"references-count":40,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,5]]}},"alternative-id":["sym14050847"],"URL":"https:\/\/doi.org\/10.3390\/sym14050847","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,19]]}}}