A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids | Wireless Personal Communications Skip to main content

Advertisement

Log in

A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

There exists a problem of user privacy leakage in the smart grids (SGs) that malicious attackers may intercept or tamper with electricity data and associate the stolen data with real users to commit crimes. Besides, node equipment resources in the SGs are limited. Aiming at the problems above, most of the existing privacy-preserving schemes apply aggregate signature to ensure the integrity of message and improve communication efficiency. However, they cannot realize the anonymity of users to block link attacks, and their aggregate signature verification usually has a high computational cost. Therefore, we propose a certificateless aggregate ring signature (CLARS) scheme based on computational Diffie-Hellman problem and decisional Diffie-Hellman problem. Our scheme is suitable for privacy-preserving in SGs. In this scheme, certificateless cryptosystem is used to avoid key escrow and certificates management problems and ring signature is used to ensure the unconditional anonymity of users. In addition, our scheme is proved to be unforgeability and unconditional anonymity under adaptively chosen message attacks against Type I and Type II adversaries in the random oracle model. Compared with previous certificateless aggregate signature schemes, our CLARS scheme has lower computational cost, which only needs two pairing operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability

All data generated or analysed during this study are included in this published article and its supplementary information files.

Code Availability

Not applicable.

References

  1. Sultan, S. (2019). Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey. Computers & Security, 84, 148–165.

    Article  Google Scholar 

  2. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE transactions on information theory, 22(6), 644–654.

    Article  MathSciNet  Google Scholar 

  3. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques (pp. 47–53). Springer.

  4. Al-Riyami, S. S., Paterson, K. G. (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security (pp. 452–473). Springer.

  5. Boneh, D., Gentry, C., Lynn, B., Shacham, H. (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In International conference on the theory and applications of cryptographic techniques (pp. 416–432). Springer.

  6. Yang, T., Kong, L., Hu, J., & Chen, Z. (2012). Survey on aggregate signature and its applications. Journal of Computer Research and Development, 49(s2), 192–199.

    Google Scholar 

  7. Yu-wen, H.A.O. (2016) A novel authentication scheme on the internet of things based on aggregate signature. Computer and Modernization (6), 103 (2016)

  8. Rivest, R. L., Shamir, A., Tauman, Y. (2001) How to leak a secret. In International conference on the theory and application of cryptology and information security (pp. 552–565). Springer.

  9. Yang, X., Wu, W., Liu, J. K., Chen, X. (2015) Lightweight anonymous authentication for ad hoc group: A ring signature approach. In International conference on provable security (pp. 215–226). Springer.

  10. Malina, L., Hajny, J., Dzurenda, P., Ricci, S. (2018) Lightweight ring signatures for decentralized privacy-preserving transactions. In ICETE (Vol. 2, pp. 692–697).

  11. Liu, Y., Liu, X., Tang, C., Wang, J., & Zhang, L. (2018). Unlinkable coin mixing scheme for transaction privacy enhancement of bitcoin. IEEE Access, 6, 23261–23270.

    Article  Google Scholar 

  12. Li, X., Mei, Y., Gong, J., Xiang, F., & Sun, Z. (2020). A blockchain privacy protection scheme based on ring signature. IEEE Access, 8, 76765–76772.

    Article  Google Scholar 

  13. Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., Cepeda, R. (2010) Privacy for smart meters: Towards undetectable appliance load signatures. In 2010 first IEEE international conference on smart grid communications (pp. 232–237). IEEE.

  14. He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T. (2007) Pda: Privacy-preserving data aggregation in wireless sensor networks. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications (pp. 2045–2053). IEEE.

  15. Groat, M.M., Hey, W., Forrest, S. (2011) Kipda: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In 2011 proceedings IEEE INFOCOM (pp. 2024–2032). IEEE.

  16. Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access, 5, 3302–3312.

    Article  Google Scholar 

  17. Wang, S., Huang, L., Nie, Y., Zhang, X., Wang, P., Xu, H., & Yang, W. (2019). Local differential private data aggregation for discrete distribution estimation. IEEE Transactions on Parallel and Distributed Systems, 30(9), 2046–2059.

    Article  Google Scholar 

  18. Bista, R., Kim, Y.-K., Song, M.-S., & Chang, J.-W. (2012). Improving data confidentiality and integrity for data aggregation in wireless sensor networks. IEICE Transactions on Information and Systems, 95(1), 67–77.

    Article  Google Scholar 

  19. Li, C., Lu, R., Li, H., Chen, L., & Chen, J. (2015). Pda: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Security and Communication Networks, 8(15), 2494–2506.

    Article  Google Scholar 

  20. Zhang, J., Zhao, Y., Wu, J., & Chen, B. (2020). Lvpda: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled iot. IEEE Internet of Things Journal, 7(5), 4016–4027.

    Article  Google Scholar 

  21. Tan, X., Zheng, J., Zou, C., & Niu, Y. (2016). Pseudonym-based privacy-preserving scheme for data collection in smart grid. International Journal of Ad Hoc and Ubiquitous Computing, 22(2), 120–127.

    Article  Google Scholar 

  22. Efthymiou, C., Kalogridis, G. (2010) Smart grid privacy via anonymization of smart metering data. In 2010 First IEEE international conference on smart grid communications (pp 238–243). IEEE.

  23. Ren, W., Song, J., Yang, Y., & Ren, Y. (2011). Lightweight privacy-aware yet accountable secure scheme for sm-sgcc communications in smart grid. Tsinghua Science and Technology, 16(6), 640–647.

    Article  Google Scholar 

  24. Sweeney, L. (2002). Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 571–588.

    Article  MathSciNet  Google Scholar 

  25. Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman Advances in Proceedings of Crypto (Vol. 82). Plenum.

  26. Liu, X., Zhang, Y., Wang, B., & Wang, H. (2014). An anonymous data aggregation scheme for smart grid systems. Security and Communication Networks, 7(3), 602–610.

    Article  Google Scholar 

  27. Cheung, J. C., Chim, T. W., Yiu, S. -M., Li, V. O., Hui, L. C. (2011). Credential-based privacy-preserving power request scheme for smart grid network. In 2011 IEEE global telecommunications conference-GLOBECOM (pp. 1–5). IEEE.

  28. Chaum, D., Van Heyst, E. (1991) Group signatures. In Workshop on the theory and application of of cryptographic techniques (pp. 257–265). Springer.

  29. Gai, K., Wu, Y., Zhu, L., Xu, L., & Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 6(5), 7992–8004.

    Article  Google Scholar 

  30. Karati, A., Islam, S. H., & Karuppiah, M. (2018). Provably secure and lightweight certificateless signature scheme for iiot environments. IEEE Transactions on Industrial Informatics, 14(8), 3701–3711.

    Article  Google Scholar 

  31. Zhang, S., Rong, J., & Wang, B. (2020). A privacy protection scheme of smart meter for decentralized smart home environment based on consortium blockchain. International Journal of Electrical Power & Energy Systems, 121, 106140.

    Article  Google Scholar 

  32. Bouakkaz, S., & Semchedine, F. (2020). A certificateless ring signature scheme with batch verification for applications in vanet. Journal of Information Security and Applications, 55, 102669.

    Article  Google Scholar 

  33. Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2018). A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems, 18, 80–89.

    Google Scholar 

  34. Liu, J., Wang, L., & Yu, Y. (2020). Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet of Things Journal, 7(6), 5256–5266.

    Article  Google Scholar 

  35. Lee, D.-H., Yim, K., & Lee, I.-Y. (2020). A certificateless aggregate arbitrated signature scheme for iot environments. Sensors, 20(14), 3983.

    Article  Google Scholar 

  36. Kar, J., Liu, X., & Li, F. (2021). Cl-ass: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks. Journal of Information Security and Applications, 61, 102905.

    Article  Google Scholar 

  37. Mei, Q., Xiong, H., Chen, J., Yang, M., Kumari, S., & Khan, M. K. (2020). Efficient certificateless aggregate signature with conditional privacy preservation in iov. IEEE Systems Journal, 15(1), 245–256.

    Article  Google Scholar 

  38. Wu, G., Zhang, F., Shen, L., Guo, F., & Susilo, W. (2020). Certificateless aggregate signature scheme secure against fully chosen-key attacks. Information Sciences, 514, 288–301.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is supported by National Natural Science Foundation of China (No. U1936213, No. 61872230, No. 62072207), the open Research Fund of Key Laboratory of Cryptography of Zhejiang Province, and Henan Key Laboratory of Network Cryptography Technology (No. LNCT2020-A05).

Funding

This work is supported by National Natural Science Foundation of China (No. U1936213, No. 61872230, No. 62072207), the open Research Fund of Key Laboratory of Cryptography of Zhejiang Province, and Henan Key Laboratory of Network Cryptography Technology (No. LNCT2020-A05).

Author information

Authors and Affiliations

Authors

Contributions

Huiwen Wang promoted the idea of this scheme, designed the algorithm, and wrote the original draft. Liangliang Wang promoted the idea of this scheme, proved the security of the proposed scheme, and reviewed and edited the original draft. Mi Wen performed a performance analysis, and reviewed and edited the original draft. Kefei Chen discussed the application, conducted a safety analysis, and reviewed and edited the original draft. Yiyuan Luo provided methodological support, investigated the scene requirements, and reviewed and edited the original draft. All authors approved the version to be published and agree to be accountable for all aspects of the work.

Corresponding author

Correspondence to Liangliang Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Consent to Participate

Not applicable.

Consent for Publication

Not applicable.

Ethical Approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Wang, L., Wen, M. et al. A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids. Wireless Pers Commun 126, 1577–1599 (2022). https://doi.org/10.1007/s11277-022-09809-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09809-5

Keywords