메뉴 건너뛰기




Volumn 7, Issue 1, 2014, Pages 234-244

SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing

Author keywords

Energy auction; Keyword search; Privacy preserving; Smart grid

Indexed keywords

COMMERCE; ELECTRIC POWER TRANSMISSION NETWORKS; ENERGY RESOURCES; MARKETING; PUBLIC KEY CRYPTOGRAPHY; SEARCH ENGINES;

EID: 84894047012     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.699     Document Type: Article
Times cited : (53)

References (25)
  • 1
    • 78650210050 scopus 로고    scopus 로고
    • The provision of frequency control reserves from multiple micro-grids
    • Yuen C, Oudalov A, Timbus A. The provision of frequency control reserves from multiple micro-grids. IEEE Transactions on Industrial Electronics 2011; 587(1): 173-183.
    • (2011) IEEE Transactions on Industrial Electronics , vol.587 , Issue.1 , pp. 173-183
    • Yuen, C.1    Oudalov, A.2    Timbus, A.3
  • 3
    • 77952134634 scopus 로고    scopus 로고
    • Smart grid at national grid. In Proceeding of ISGT 2010, Gaithersburg, MD, Jan.
    • Forte VJ. Smart grid at national grid. In Proceeding of ISGT 2010, Gaithersburg, MD, Jan. 2010; 1-4.
    • (2010) , pp. 1-4
    • Forte, V.J.1
  • 4
    • 33947369028 scopus 로고    scopus 로고
    • Distributed intelligent energy management system for a single-phase high-frequency AC microgrid
    • Chakraborty S, Weiss MD, Simoes MG. Distributed intelligent energy management system for a single-phase high-frequency AC microgrid. IEEE Transactions on Industrial Electronics 2007; 54(1): 97-109.
    • (2007) IEEE Transactions on Industrial Electronics , vol.54 , Issue.1 , pp. 97-109
    • Chakraborty, S.1    Weiss, M.D.2    Simoes, M.G.3
  • 5
    • 84864583229 scopus 로고    scopus 로고
    • EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications
    • Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9): 1621-1632.
    • (2012) IEEE Transactions on Parallel and Distributed Systems , vol.23 , Issue.9 , pp. 1621-1632
    • Lu, R.1    Liang, X.2    Li, X.3    Lin, X.4    Shen, X.5
  • 6
    • 85184298119 scopus 로고    scopus 로고
    • EDR: an efficient demand response scheme for achieving forward secrecy in smart grid. In Proceedings of 2012 IEEE Global Telecommunications Conference (GLOBECOM 2012), to appear.
    • Li H, Liang X, Lu R, Lin X, Shen X. EDR: an efficient demand response scheme for achieving forward secrecy in smart grid. In Proceedings of 2012 IEEE Global Telecommunications Conference (GLOBECOM 2012), to appear.
    • Li, H.1    Liang, X.2    Lu, R.3    Lin, X.4    Shen, X.5
  • 7
    • 33751106980 scopus 로고    scopus 로고
    • Enhanced anonymous auction protocols with freewheeling bids. In Proceedings of 20th International Conference on Advanced Information Networking and Application (AINA06)
    • Chang YF, Chang CC. Enhanced anonymous auction protocols with freewheeling bids. In Proceedings of 20th International Conference on Advanced Information Networking and Application (AINA06), 2006; 353-358.
    • (2006) , pp. 353-358
    • Chang, Y.F.1    Chang, C.C.2
  • 8
    • 79953037029 scopus 로고    scopus 로고
    • Practical electronic auction scheme with strong anonymity and bidding privacy
    • Li MJ, Justie STJ, Jennifer HCT. Practical electronic auction scheme with strong anonymity and bidding privacy. Information Sciences 2011; 181(12): 2576-2586.
    • (2011) Information Sciences , vol.181 , Issue.12 , pp. 2576-2586
    • Li, M.J.1    Justie, S.T.J.2    Jennifer, H.C.T.3
  • 9
    • 77950864045 scopus 로고    scopus 로고
    • Proxy re-encryption with keyword search
    • Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Information Sciences 2010; 180(13): 2576-2587.
    • (2010) Information Sciences , vol.180 , Issue.13 , pp. 2576-2587
    • Shao, J.1    Cao, Z.2    Liang, X.3    Lin, H.4
  • 10
    • 32144447606 scopus 로고    scopus 로고
    • Network constraint impacts on the competitive electrically markets under supply-side strategic bidding
    • Bompard E, Lu W, Napoli R. Network constraint impacts on the competitive electrically markets under supply-side strategic bidding. IEEE Transactions on Power Systems 2006; 21(1): 160-170.
    • (2006) IEEE Transactions on Power Systems , vol.21 , Issue.1 , pp. 160-170
    • Bompard, E.1    Lu, W.2    Napoli, R.3
  • 11
  • 12
    • 1642268122 scopus 로고    scopus 로고
    • An improvement of generation firm's bidding strategies based on conjectural variation regulation via dynamic learning
    • Song Y, Ni Y, Wen F. An improvement of generation firm's bidding strategies based on conjectural variation regulation via dynamic learning. In proceedings of the CSEE 2003; 23(12): 23-27.
    • (2003) In proceedings of the CSEE , vol.23 , Issue.12 , pp. 23-27
    • Song, Y.1    Ni, Y.2    Wen, F.3
  • 13
    • 33846845187 scopus 로고    scopus 로고
    • Supplier bidding strategy based on non-cooperative game theory concepts in single auction power pools
    • Kanga DJ, Kimb BH, Hur D. Supplier bidding strategy based on non-cooperative game theory concepts in single auction power pools. Electric Power Systems Research 2007; 77(5-6): 630-636.
    • (2007) Electric Power Systems Research , vol.77 , Issue.5-6 , pp. 630-636
    • Kanga, D.J.1    Kimb, B.H.2    Hur, D.3
  • 14
    • 33644606618 scopus 로고    scopus 로고
    • An electronic online bidding auction protocol with both security and efficiency
    • Liaw HT, Juang WS, Lin CK. An electronic online bidding auction protocol with both security and efficiency. Applied Mathematics and Computation 2006; 174(2): 1487-1497.
    • (2006) Applied Mathematics and Computation , vol.174 , Issue.2 , pp. 1487-1497
    • Liaw, H.T.1    Juang, W.S.2    Lin, C.K.3
  • 15
    • 70749116607 scopus 로고    scopus 로고
    • An efficient privacy preserving keyword search scheme in cloud computing. In Proceeding of 2009 International Conference on Computational Science and Engineering
    • Liu Q, Wang G, Wu J. An efficient privacy preserving keyword search scheme in cloud computing. In Proceeding of 2009 International Conference on Computational Science and Engineering, 2009; 715-720.
    • (2009) , pp. 715-720
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 16
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search. In Proceeding of EUROCRYPT. LNCS, vol. 3027
    • Boneh D, Crescenzo DG, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proceeding of EUROCRYPT 2004. LNCS, vol. 3027, 506-522.
    • (2004) , pp. 506-522
    • Boneh, D.1    Crescenzo, D.G.2    Ostrovsky, R.3    Persiano, G.4
  • 19
    • 84885891567 scopus 로고    scopus 로고
    • An efficient searchable encryption scheme and its application in network forensics. In Proceeding of E-Forensics, LNICST 56
    • Lin X, Lu R, Foxton K, Shen X. An efficient searchable encryption scheme and its application in network forensics. In Proceeding of E-Forensics 2010, LNICST 56, 66-78.
    • (2010) , pp. 66-78
    • Lin, X.1    Lu, R.2    Foxton, K.3    Shen, X.4
  • 20
    • 78649325305 scopus 로고    scopus 로고
    • An efficient public key encryption with conjunctive-subset keywords search
    • Zhang B, Zhang FG. An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications 2011; 34(1): 262-267.
    • (2011) Journal of Network and Computer Applications , vol.34 , Issue.1 , pp. 262-267
    • Zhang, B.1    Zhang, F.G.2
  • 21
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Dan B, Ben L, Hovav S. Short signatures from the Weil pairing. Journal of Cryptology 2004; 17(4): 297-319.
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Dan, B.1    Ben, L.2    Hovav, S.3
  • 22
    • 84894103229 scopus 로고    scopus 로고
    • Efficient implementation of cryptographic pairings. Available
    • Scott M. Efficient implementation of cryptographic pairings. Available: http://ecrypt-ss07.rhul.ac.uk/Slides/Thursday/mscottsamos07.pdf
    • Scott, M.1
  • 23
    • 84894054381 scopus 로고    scopus 로고
    • Shamus software
    • Shamus software. http://www.shamus.ie/index.php?page=Benchmarks.
  • 24
    • 84894077653 scopus 로고    scopus 로고
    • The exact security of an identity based signature and its applications. Preprint available at
    • Libert B, Quisquater JJ. The exact security of an identity based signature and its applications. Preprint available at http://eprint.iacr.org/2004/102.
    • Libert, B.1    Quisquater, J.J.2
  • 25
    • 34547358080 scopus 로고    scopus 로고
    • Pairings
    • Chapter 9, Cambridge University Press: New York, NY, USA
    • Galbraith SD. Pairings. Advances in Elliptic Curve Cryptography, Chapter 9, Cambridge University Press: New York, NY, USA; 2005; 183-213.
    • (2005) Advances in Elliptic Curve Cryptography , pp. 183-213
    • Galbraith, S.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.