• 1
    Cleveland F. Cyber security issues for advanced metering infrastructure (AMI). Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE, 2008; 15. doi:10.1109/PES.2008.4596535.
  • 2
    Hart G. Nonintrusive appliance load monitoring. Proceedings of the IEEE 1992; 80(12):18701891. doi:10.1109/5.192069.
  • 3
    Quinn E. Privacy and the new energy infrastructure. Social Science Research Network (SSRN), February 2009.
  • 4
    Kursawe K, Danezis G, Kohlweiss M. Privacy-friendly aggregation for the smart-grid. In Proceedings of the 11th International Conference on Privacy Enhancing Technologies, PETS'11. Springer-Verlag: Berlin, Heidelberg, 2011; 175191. URL
  • 5
    Efthymiou C, Kalogridis G. Smart grid privacy via anonymization of smart metering data. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 238243. doi:10.1109/SMARTGRID.2010.5622050.
  • 6
    Molina-Markham A, Shenoy P, Fu K, Cecchet E, Irwin D. Private memoirs of a smart meter. In Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, BuildSys '10. ACM: New York, NY, USA, 2010; 6166. doi:10.1145/1878431.1878446. URL
  • 7
    Bohli JM, Sorge C, Ugus O. A privacy model for smart metering. 2010 IEEE International Conference on Communications Workshops (ICC), 2010; 15. doi:10.1109/ICCW.2010.5503916.
  • 8
    Kalogridis G, Efthymiou C, Denic S, Lewis T, Cepeda R. Privacy for smart meters: towards undetectable appliance load signatures. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 232237. doi:10.1109/SMARTGRID.2010.5622047.
  • 9
    Varodayan DP, Khisti A. Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage. ICASSP, IEEE, 2011; 19321935. URL
  • 10
    McLaughlin S, McDaniel P, Aiello W. Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11. ACM: New York, NY, USA, 2011; 8798, doi:10.1145/2046707.2046720. URL
  • 11
    Ács G, Castelluccia C. I have a dream!: differentially private smart metering. In Proceedings of the 13th International Conference on Information Hiding, IH'11. Springer-Verlag: Berlin, Heidelberg, 2011; 118132. URL
  • 12
    Bisoi S. Protecting customer privacy in smart grid by coupling asymmetric cryptography with anonimized usage data, white paper. Infosys Technologies Ltd., May 2011.
  • 13
    Bartoli A, Hernandez-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D. Secure lossless aggregation for smart grid m2m networks. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 333338. doi:10.1109/SMARTGRID.2010.5622063.
  • 14
    Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 327332. doi:10.1109/SMARTGRID.2010.5622064.
  • 15
    Garcia FD, Jacobs B. Privacy-friendly energy-metering via homomorphic encryption. In Proceedings of the 6th International Conference on Security and Trust Management, STM'10. Springer-Verlag: Berlin, Heidelberg, 2011; 226238. URL
  • 16
    Saputro N, Akkaya K. Performance evaluation of smart grid data aggregation via homomorphic encryption. Wireless Communications and Networking Conference (WCNC), 2012 IEEE, 2012; 29452950. doi:10.1109/WCNC.2012.6214307.
  • 17
    Fontaine C, Galand F. A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security 2007; 2007: 15:115:15. doi:10.1155/2007/13801. URL
  • 18
    Paillier P. Trapdooring discrete logarithms on elliptic curves over rings. In Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '00. Springer-Verlag: London, UK, UK, 2000; 573584. URL
  • 19
    Hankerson D, Menezes AJ, Vanstone S. Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc.: Secaucus, NJ, USA, 2003.
  • 20
    Paillier P. Public-key cryptosystems based on composite degree residuosity classes. Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'99. Springer-Verlag: Berlin, Heidelberg, 1999; 223238. URL
  • 21
    Okamoto T, Uchiyama S. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology EUROCRYPT'98, Lecture Notes in Computer Science, vol. 1403, Nyberg K (ed.). Springer: Berlin, Heidelberg, 1998; 308318. doi:10.1007/BFb0054135. URL
  • 22
    Naccache D, Stern J. A new public key cryptosystem based on higher residues. In Proceedings of the 5th ACM Conference on Computer and Communications Security, CCS '98. ACM: New York, NY, USA, 1998; 5966. doi:10.1145/288090.288106. URL
  • 23
    Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21:120126.
  • 24
    El Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of CRYPTO 84 on Advances in Cryptology. Springer-Verlag New York, Inc.: New York, NY, USA, 1985; 1018. URL
  • 25
    Domingo-Ferrer J. A provably secure additive and multiplicative privacy homomorphism. In Proceedings of the 5th International Conference on Information Security, ISC '02. Springer-Verlag: London, UK, UK, 2002; 471483. URL
  • 26
    Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005, 2005; 109117. doi:10.1109/MOBIQUITOUS.2005.25.
  • 27
    Deshpande JG, Kim E, Thottan M. Differentiated services QoS in smart grid communication networks. Bell Labs Technical Journal 2011; 16(3): 6181. doi:10.1002/bltj.20522. URL
  • 28
    DOE. Communications requirements of smart grid technologies, Oct 2010.
  • 29
    Ugus O, Westhoff D, Laue R, Shoufan A, Huss SA. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. 2nd Workshop on Embedded Systems Security (WESS), 2007.
  • 30
    Lauter K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications 2004; 11(1):6267. doi:10.1109/MWC.2004.1269719.
  • 31
    Mykletun E, Girao J, Westhoff D. Public key based cryptoschemes for data concealment in wireless sensor networks. IEEE International Conference on Communications, 2006, ICC '06, vol. 5, 2006; 22882295. doi:10.1109/ICC.2006.255111.
  • 32
    King B. Mapping an arbitrary message to an elliptic curve when defined over gf (2n). International Journal of Network Security 2009; 8(2):169176.
  • 33
    Fang X, Li L. On Karatsuba multiplication algorithm. In Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, ISDPE '07. IEEE Computer Society: Washington, DC, USA, 2007; 274276. doi:10.1109/ISDPE.2007.92. URL