KEYWORDS: Seaborgium, Blockchain, Power grids, Information security, Design and modelling, Systems modeling, Power consumption, Data privacy, Astatine, Algorithm testing
With the continuous progress of new energy technology, new energy vehicles have gradually become the mainstream. More and more new Energy Vehicles (EV) are put into use, which not only brings challenges to the current Smart Grid (SG) system, but also brings brand new opportunities. Vehicle-to-grid (V2G) is a new technology, which not only realizes the power transmission from the grid to the Vehicle, but also realizes the auxiliary power transmission ability from the vehicle to the grid. But the privacy problem and the fairness of the transaction are still an urgent problem to be solved. Privacy issues can lead to the user's privacy being obtained and analyzed by malicious participants, resulting in the user's property being threatened. Fair exchange means that in the transaction process, if one party is malicious, the honest party has no loss or the loss is negligible, or if both parties are malicious or honest, there is no loss for either party. This paper proposes a Vehicle-to-grid privacy protection fair exchange system based on blockchain. Homomorphic commitment and hash chain are introduced to achieve privacy protection and fair exchange.
Federated learning (FL) enables decentralized data sources like mobile phones to joint training a neural network model without sharing the original data. However, shared local gradients make the privacy of local data in FL vulnerable. The aggregation server also may return incorrect results to clients due to unexpected error or the deliberately attack. In this work, we explore how to design a non-interactive and publicly verifiable aggregation scheme. The existing verifiable schemes are under semi-honest adversary model, in which the server is honest-but-curious but with additional power to counterfeit the aggregation result. We propose a scheme under stronger security model against malicious servers. The proposed scheme guarantees that as long as the two servers are non-colluding, even a malicious server cannot obtain input privacy of client. The malicious server will be detected by honest clients when it tries to tamper the result.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.