[1] LORENA M,TUBALLA.A review of the development of Smart Grid technologies[J].Renewable and Sustainable Energy Reviews,2016,59:710-725. [2] 陈树勇,宋书芳,李兰欣,等.智能电网技术综述[J].电网技术,2009,33(8):1-7. CHEN S Y,SONG S F,LI L X,et al.Survey on smart grid technology[J].Power System Technology,2009,33(8):1-7.(in Chinese) [3] ZHENG Y L.Digital signcryption or how to achieve cost(signature & encryption)《cost(signature) + cost(encryption)[M]//BURTON S.KALISKI.Advances in Cryptology-CRYPTO'97.Berlin,Germany:Springer,1997:165-179. [4] CHAUM D.Blind signatures for untraceable payments[M]//CHAUM D,RIVEST R L,SHERMAN A T. Advances in Cryptology.Berlin,Germany:Springer,1983:199-203. [5] SHEN-TAT G,HWEEHWA P,ROBERT H D,et al.Three architectures for trusted data dissemination in edge computing[J].Data and Knowledge Engineering,2005,58(3):34-45. [6] IBRAHIM S,KAMAT M,SALLEH M,et al.Secure E-voting with blind signature[C]//Proceedings of the 4th National Conference of Telecommunication Technology,Washington D.C.,USA:IEEE Press,2003:193-197. [7] MORELLO R,DE CAPUA C,FULCO G,et al.A smart power meter to monitor energy flow in smart grids:the role of advanced sensing and IoT in the electric grid of the future[J].IEEE Sensors Journal,2017,17(23):7828-7837. [8] TAN S,DE D,SONG W Z,et al.Survey of security advances in smart grid:a data driven approach[J].IEEE Communications Surveys & Tutorials,2017,19(1):397-422. [9] SHEN H,ZHANG M W,SHEN J.Efficient privacy-preserving cube-data aggregation scheme for smart grids[J].IEEE Transactions on Information Forensics and Security,2017,12(6):1369-1381. [10] DIMITRIOU T,KARAME G O.Enabling anonymous authorization and rewarding in the smart grid[J].IEEE Transactions on Dependable and Secure Computing,2017,14(5):565-572. [11] CHAUDHRY S A,NEBHAN J,YAHYA K,et al.A privacy enhanced authentication scheme for securing smart grid infrastructure[J].IEEE Transactions on Industrial Informatics,2022,18(7):5000-5006. [12] JESKE T.Privacy-preserving smart metering without a trusted-third-party[C]//Proceedings of the International Conference on Security and Cryptography.Washington D.C.,USA:IEEE Press,2014:114-123. [13] GARG S,KAUR K,KADDOUM G,et al.Secure and lightweight authentication scheme for smart metering infrastructure in smart grid[J].IEEE Transactions on Industrial Informatics,2020,16(5):3548-3557. [14] ZHU L H,LI M,ZHANG Z J,et al.Privacy-preserving authentication and data aggregation for fog-based smart grid[J].IEEE Communications Magazine,2019,57(6):80-85. [15] WANG W Z,HUANG H K,ZHANG L J,et al.Secure and efficient mutual authentication protocol for smart grid under blockchain[J].Peer-to-Peer Networking and Applications,2021,14(5):2681-2693. [16] MOHANTY S,MAJHI B.A secure multi authority electronic voting protocol based on blind signature[C]//Proceedings of International Conference on Advances in Computer Engineering.Washington D.C.,USA:IEEE Press,2010:271-273. [17] TSAUR W J,TSAO J H,TSAO Y H.An efficient and secure ECC-based partially blind signature scheme with multiple banks issuing E-cash payment applications[C]//Proceedings of International Conference on E-Learning,E-Business,Enterprise Information Systems,and E-Government.Washington D.C.,USA:IEEE Press,2018:94-100. [18] YIN D Q,ZHANG M S,WEI B.Blockchain E-voting scheme based on SM9 partial blind signature[C]//Proceedings of International Conference on Computer Information Science and Artificial Intelligence.Washington D.C.,USA:IEEE Press,2022:1005-1011. [19] MAMBO M,USUDA K,OKAMOTO E.Proxy signatures for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security.New York,USA:ACM Press,1996:48-57. [20] LI X,CHEN K,SUN L.Certificateless signature and proxy signature schemes from bilinear pairings[J].Lithuanian Mathematical Journal,2005,45(1):76-83. [21] 陈虎,张福泰,宋如顺.可证安全的无证书代理签名方案[J].软件学报,2009,20(3):692-701. CHEN H,ZHANG F T,SONG R S.Certificateless proxy signature scheme with provable security[J].Journal of Software,2009,20(3):692-701.(in Chinese) [22] KUMAR G,VERMA.An efficient and provable certificate-based proxy signature scheme for IIoT environment[J].Information Sciences,2020,518:142-156. [23] RAMESH D,MISHRA R,EDLA D R,et al.Secure identity-based proxy signature with computational diffie-Hellman for cloud data management[M]//GUPTA B B.Modern Principles,Practices,and Algorithms for Cloud Security.[S.l.]:IGI Global,2020:79-106. [24] XU Z,LUO M,VIJAYAKUMAR P,et al.Efficient certificateless designated verifier proxy signature scheme using UAV network for sustainable smart city[J].Sustainable Cities and Society,2022,80:71-82. [25] LIN W D,JAN J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Computing.Washington D.C.,USA:IEEE Press,2000:273-277. [26] 喻琇瑛,何大可,吴汉舟.新的可证明安全的无证书代理盲签名[J].四川大学学报(工程科学版),2014,46(5):110-115. YU X Y,HE D K,WU H Z.A new provably-secure certificateless proxy blind signature scheme[J].Journal of Sichuan University (Engineering Science Edition),2014,46(5):110-115.(in Chinese) [27] TENG L,LI H.A high-efficiency discrete logarithm-based multi-proxy blind signature scheme via elliptic curve and bilinear mapping[EB/OL].[2022-06-20].https://www.semanticscholar.org/paper/A-High-efficiency-Discrete-Logarithm-based-Blind-Teng-Li/22de014f9b9bf47989e30f845cb1c6e3824987a0. [28] VERMA G K,SINGH B B,SINGH H.Provably secure certificate-based proxy blind signature scheme from pairings[J].Information Sciences,2018,468:1-13. [29] HE L,MA J F,MO R,et al.Designated verifier proxy blind signature scheme for unmanned aerial vehicle network based on mobile edge computing[J].Security and Communication Networks,2019,2019:1-12. [30] JAMES S,THUMBUR G,VASUDEVA R.Pairing-free identity-based proxy signature scheme with message recovery[J].International Journal of Information Security and Privacy,2021,15(1):117-137. [31] YU H F,WANG Z C,LI J M,et al.Identity-based proxy signcryption protocol with universal composability[J].Security and Communication Networks,2018,18(6):1-11. [32] HUNDERA N W,MEI Q,XIONG H,et al.A secure and efficient identity-based proxy signcryption in cloud data sharing[J].KSII Transactions on Internet and Information Systems,2020,14(1):455-472. [33] QU Y Y,ZENG J W.Certificateless proxy signcryption in the standard model for a UAV network[J].IEEE Internet of Things Journal,2022,9(16):15116-15127. [34] YU G,MA X X,SHEN Y,et al.Provable secure identity based generalized signcryption scheme[EB/OL].[2022-06-20].https://arxiv.org/abs/1004.1304. [35] GUO H,DENG L Z.An identity based proxy signcryption scheme without pairings[EB/OL].[2022-06-20].https://www.semanticscholar.org/paper/An-Identity-Based-Proxy-Signcryption-Scheme-without-Guo-Deng/79fd2a2d74012f652db1604f37b41718c9d82a15. [36] YU X Y,HE D K.A new efficient blind signcryption[J].Wuhan University Journal of Natural Sciences,2008,13(6):662-664. [37] YU H F,TIAN L Q,WANG Z C.Self-certified proxy blind signcryption scheme from pairings[C]//Proceedings of International Conference on Network Computing and Information Security.Washington D.C.,USA:IEEE Press,2011:316-320. [38] ABOUELSEOUD Y.New blind signcryption schemes with application to E-cash systems[C]//Proceedings of the 5th International Conference on Computing,Communications and Networking Technologies.Washington D.C.,USA:IEEE Press,2014:1-6. [39] TSAI C H,SU P C.An ECC-based blind signcryption scheme for multiple digital documents[J].Security and Communication Networks,2017,17(1):1-14. [40] SU P C,TSAI C H.New proxy blind signcryption scheme for secure multiple digital messages transmission based on elliptic curve cryptography[J].KSII Transactions on Internet and Information Systems,2017,11(11):5537-5555. [41] BASHIR M Z U,ALI R.Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve[J].Electronics Letters,2019,55(8):457-459. [42] ULLAH R,NIZAMUDDIN,UMAR A I,et al.Blind signcryption scheme based on elliptic curves[C]//Proceedings of Conference on Information Assurance and Cyber Security.Washington D.C.,USA:IEEE Press,2014:51-54. [43] POINTCHEVAL D,STERN J.Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-396. [44] Shamus Software Ltd.MIRACL library[EB/OL].[2022-06-20].https://miracl.com/. |