[1] Anderson R, Fuloria S. Who controls the off switch?[C]//2010 First IEEE
International Conference on Smart Grid Communications. Gaithersburg,
MD: IEEE, 2010: 96-101
[2] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[R]. Manubot,
2019
[3] Kushch S, Castrillo F P. A review of the applications of the Block-chain
technology in smart devices and dis-tributed renewable energy grids[J].
ADCAIJ: Advances in Distributed Computing and Artificial Intelligence
Journal, 2017, 6(3): 75-84
[4] Mylrea M, Gourisetti S N G. Blockchain for smart grid resilience:
Exchanging distributed energy at speed, scale and security[C]//2017
Resilience Week (RWS). Wilmington, DE: IEEE, 2017: 18-23
[5] Wu X, Duan B, Yan Y, et al. M2m blockchain: The case of demand side
management of smart grid[C]//2017 IEEE 23rd International Conference
on Parallel and Distributed Systems (ICPADS). Shenzhen: IEEE, 2017:
810-813
[6] Lu R, Liang X, Li X, et al. EPPA: An efficient and privacy-preserving
aggregation scheme for secure smart grid communications[J]. IEEE
Transactions on Parallel and Distributed Systems, 2012, 23(9): 1621-1631
[7] Rottondi C, Verticale G, Krauss C. Distributed privacy-preserving
aggregation of metering data in smart grids[J]. IEEE Journal on Selected
Areas in Communications, 2013, 31(7): 1342-1354
[8] Wang H, He D, Zhang S. Balanced anonymity and traceability for
outsourcing small-scale data linear aggregation in the smart grid[J]. IET
Information Security, 2016, 11(3): 131-138
[9] He D, Kumar N, Zeadally S, et al. Efficient and privacy-preserving data
aggregation scheme for smart grid against internal adversaries[J]. IEEE
Transactions on Smart Grid, 2017, 8(5): 2411-2419
[10] Yang Z, Yu S, Lou W, et al. : Privacy-preserving communication and
precise reward architecture for V2G networks in smart grid[J]. IEEE
Transactions on Smart Grid, 2011, 2(4): 697-706
[11] Wang H, Qin B, Wu Q, et al. TPP: Traceable privacy-preserving
communication and precise reward for vehicle-to-grid networks in smart
grids[J]. IEEE Transactions on Information Forensics and Security, 2015,
10(11): 2340-2351
[12] Aitzhan N Z, Svetinovic D. Security and privacy in decentralized energy
trading through multi-signatures, blockchain and anonymous messaging
streams[J]. IEEE Transactions on Dependable and Secure Computing, 2016,
15(5): 840-852
[13] Dorri A, Luo F, Kanhere S S, et al. SPB: A Secure Private
Blockchain-Based Solution for Distributed Energy Trading[J]. IEEE
Communications Magazine, 2019, 57(7): 120-126
[14] Gai K, Wu Y, Zhu L, et al. Privacy-preserving energy trading usingconsortium blockchain in smart grid[J]. IEEE Transactions on Industrial
Informatics, 2019, 15(6): 3548-3558
[15] Rivest R L, Shamir A, Tauman Y. How to leak a secret[C]//International
Conference on the Theory and Application of Cryptology and Information
Security. Springer, Berlin, Heidelberg, 2001: 552-565
[16] Saberhagen N. CryptoNote Version 2.0. Accessed: Jan. 11, 2019.
[Online]. Available: https://static.coinpaprika.com/storage/cdn/whit
epapers/1611.pdf
[17] Costan, V., & Devadas, S. Intel SGX Explained. IACR Cryptol. ePrint
Arch., 2016(86), 1-118
[18] Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted
signatures from bilinear maps[C]//International Conference on the Theory
and Applications of Cryptographic Techniques. Berlin: Springer, 2003:
416-432
[19] Bellare M. New proofs for NMAC and HMAC: security without collision
resistance[J]. Journal of Cryptology, 2015, 28(4): 844-878
[20] Wang H, Wang Q, He D, et al. BBARS: Blockchain-based anonymous
rewarding scheme for V2G networks[J]. IEEE Internet of Things Journal,
2019, 6(2): 3676-3687
|