Abstract
Double auction provides a cost-effective manner for sellers/buyers in smart grid. Due to concerns about information leakage, the asks/bids from sellers/buyers are sealed, making it challenging to select potential winners. To address this problem, the concept of public key encryption with equality test is deployed in double auction, since it is able to perform information retrieval over secure asks/bids. However, previous solutions suffer from the following two limitations: (i) unable to check inconsistent secure asks/bids due to the lack of tester-verifiable mechanism; (ii) incurring high matching time costs caused by one-to-one secure asks/bids. Therefore, we propose the VerDA, a secure double auction retrieval system with verifiable equality retrieval towards multiple secure asks/bids. Technically, to achieve the property of consistency over secure asks/bids, we develop the tester-verifiable technology by combining the decryption module and test module. To improve the efficiency of retrieval, we introduce secure multi-asks/bids testing function by augmenting the number of inputs in a same retrieval process. Moreover, we implement VerDA based on the PJM dataset in real cloud environment, where the experimental results show practical performance with encryption and test costs amounting to only 57.4% and 18.7% compared to state-of-the-art solution.







Similar content being viewed by others
Data availability
No datasets were generated or analysed during the current study.
References
Chen S, Xu H, Liu D, Hu B, Wang H (2014) A vision of iot: applications, challenges, and opportunities with china perspective. IEEE Internet Things J 1(4):349–359
Wang W, Huang H, Zhang L, Su C (2021) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw Appl 14:2681–2693
Chen L, Lu R, Cao Z (2015) Pdaft: a privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Netw Appl 8:1122–1132
Safkhani M, Kumari S, Shojafar M, Kumar S (2022) An authentication and key agreement scheme for smart grid. Peer-to-Peer Netw Appl 15(3):1595–1616
Kumar V, Kumar R, Pandey SK (2021) Lkm-ami: a lightweight key management scheme for secure two way communications between smart meters and han devices of ami system in smart grid. Peer-to-Peer Netw Appl 14:82–100
Smart grid remote terminal units for decentralized energy resources (2023) https://www.smartgridtechnology.net/tag/microgrids/. online
Borenstein S, Jaske M, Rosenfeld A (2002) Dynamic pricing, advanced metering, and demand response in electricity markets
Australia’s NSW launches renewable energy auction (2022) https://renewablesnow.com/news/australias-nsw-launches-renewable-energy-auction-800010/. online
Hassan MU, Rehmani MH, Chen J (2021) Optimizing blockchain based smart grid auctions: a green revolution. IEEE Trans Green Commun Netw 6(1):462–471
Hart GW (1992) Nonintrusive appliance load monitoring. Proc IEEE 80(12):1870–1891
Australia: OAIC finds Uber interfered with privacy rights (2021) https://www.dataguidance.com/news/australia-oaic-finds-uber-interfered-privacy-rights. online
Wen M, Lu R, Lei J, Li H, Liang X, Shen X (2014) Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing. Secur Commun Netw 7(1):234–244
Fan K, Chen Q, Su R, Zhang K, Wang H, Li H, Yang Y (2021) Msiap: a dynamic searchable encryption for privacy-protection on smart grid with cloud-edge-end. IEEE Trans Cloud Comput
Yang G, Tan CH, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test. In: Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, Springer, pp 119–131
Ma S, Zhou P, Huang Q, Wang J (2023) Mter: an efficient multi-user threshold equality retrieval for double auction in smart grid market. IEEE Trans Inform Forensics Secur
Zhao Z, Susilo W, Wang B, Zeng K (2023) Public-key encryption with tester verifiable equality test for cloud computing. IEEE Trans Cloud Comput
APR 2023 Auction (2023) https://www.pjm.com/markets-and-operations/data-dictionary. online
Li D, Yang Q, Yu W, An D, Zhang Y, Zhao W (2019) Towards differential privacy-based online double auction for smart grid. IEEE Trans Inf Forensics Secur 15:971–986
Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Annual international cryptology conference, Springer, pp 41–55
Lee HT, Ling S, Seo JH, Wang H, Youn T-Y (2020) Public key encryption with equality test in the standard model. Inf Sci 516:89–108
Ma S, Huang Q, Zhang M, Yang B (2014) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470
Ma S, Zhong Y, Huang Q (2022) Efficient public key encryption with outsourced equality test for cloud-based iot environments. IEEE Trans Inf Forensics Secur 17:3758–3772
Lin H, Zhao G, Song S, Wu W, Jiang W (2023) A new lightweight public key encryption with equality test for cloud storage. Multimed Tool Appl:1–22
The stanford pairing based crypto library (2006) https://crypto.stanford.edu/pbc/. online
Li D, Yang Q, Yu W, An D, Yang X, Zhao W (2017) A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. In: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), IEEE, pp 1–8
Li D, Yang Q, An D, Yu W, Yang X, Fu X (2018) On location privacy-preserving online double auction for electric vehicles in microgrids. IEEE Internet Things J 6(4):5902–5915
Abidin A, Aly A, Cleemput S, Mustafa MA (2016) An mpc-based privacy-preserving protocol for a local electricity trading market. In: Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings 15, Springer, pp 615–625
Abidin A, Aly A, Cleemput S, Mustafa MA (2018) Secure and privacy-friendly local electricity trading and billing in smart grid. arXiv:1801.08354
Sarenche R, Salmasizadeh M, Ameri MH, Aref MR (2021) A secure and privacy-preserving protocol for holding double auctions in smart grid. Inf Sci 557:108–129
Shi W, Bao Z, Wang J, Lu N, Zhu F, Shen J (2017) A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market. Pers Ubiquit Comput 21:779–789
Zhang S, Ying X, Wang B (2023) A privacy protection scheme based on linkable ring signature for user payment of peer-to-peer uniform-price double auction transaction in the microgrid day-ahead market. Int J Electr Power Energy Syst 147:108806
Boneh D, DiCrescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, Springer, pp 506–522
Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian conference on information security and privacy, Springer, pp 389–406
Tang Q (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. Int J Appl Crypto 2(4):304–321
Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Secur Commun Netw 5(12):1351–1362
Huang K, Tso R, Chen Y-C, Rahman SMM, Almogren A, Alamri A (2015) Pke-aet: public key encryption with authorized equality test. Comput J 58(10):2686–2697
Zhang K, Chen J, Lee HT, Qian H, Wang H (2019) Efficient public key encryption with equality test in the standard model. Theoret Comput Sci 755:65–80
Ling Y, Ma S, Huang Q, Li X, Ling Y (2020) Group public key encryption with equality test against offline message recovery attack. Inf Sci 510:16–32
Susilo W, Guo F, Zhao Z, Wu G (2020) Pke-met: public-key encryption with multi-ciphertext equality test in cloud computing. IEEE Trans Cloud Comput 10(2):1476–1488
Ling Y, Ma S, Huang Q, Li X (2018) A general two-server framework for ciphertext-checkable encryption against offline message recovery attack. In: International conference on cloud computing and security, Springer, pp 370–382
Ma S, Ling Y (2018) A general two-server cryptosystem supporting complex queries. In: Information Security Applications: 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers 18, Springer, pp 249–260
Chen B, He D, Kumar N, Wang H, Choo K-KR (2020) A blockchain-based proxy re-encryption with equality test for vehicular communication systems. IEEE Trans Netw Sci Eng 8(3):2048–2059
Funding
This work was supported by the National Natural Science Foundation of China (62372285), Shanghai Rising-Star Program (22QA1403800), Natural Science Foundation of Shanghai (22ZR1427100) and the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (No. SKLACSS-202310).
Author information
Authors and Affiliations
Contributions
Kai Zhang, Ludan Lu and Lifei Wei designed the algorithm and presented security analysis. Ludan Lu and Jian Zhao conducted the experiment. Kai Zhang, Lifei Wei and Jianting Ning wrote the main manuscript text. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Ethics statement
This article does not contain any studies with human participants or animals performed by any of the authors.
Competing interest
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy
Guest Editors: Rongxing Lu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, K., Lu, L., Zhao, J. et al. Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid. Peer-to-Peer Netw. Appl. 17, 3255–3268 (2024). https://doi.org/10.1007/s12083-024-01744-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01744-5