Skip to main content
Log in

Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Double auction provides a cost-effective manner for sellers/buyers in smart grid. Due to concerns about information leakage, the asks/bids from sellers/buyers are sealed, making it challenging to select potential winners. To address this problem, the concept of public key encryption with equality test is deployed in double auction, since it is able to perform information retrieval over secure asks/bids. However, previous solutions suffer from the following two limitations: (i) unable to check inconsistent secure asks/bids due to the lack of tester-verifiable mechanism; (ii) incurring high matching time costs caused by one-to-one secure asks/bids. Therefore, we propose the VerDA, a secure double auction retrieval system with verifiable equality retrieval towards multiple secure asks/bids. Technically, to achieve the property of consistency over secure asks/bids, we develop the tester-verifiable technology by combining the decryption module and test module. To improve the efficiency of retrieval, we introduce secure multi-asks/bids testing function by augmenting the number of inputs in a same retrieval process. Moreover, we implement VerDA based on the PJM dataset in real cloud environment, where the experimental results show practical performance with encryption and test costs amounting to only 57.4% and 18.7% compared to state-of-the-art solution.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Chen S, Xu H, Liu D, Hu B, Wang H (2014) A vision of iot: applications, challenges, and opportunities with china perspective. IEEE Internet Things J 1(4):349–359

    Article  Google Scholar 

  2. Wang W, Huang H, Zhang L, Su C (2021) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw Appl 14:2681–2693

    Article  Google Scholar 

  3. Chen L, Lu R, Cao Z (2015) Pdaft: a privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Netw Appl 8:1122–1132

    Article  Google Scholar 

  4. Safkhani M, Kumari S, Shojafar M, Kumar S (2022) An authentication and key agreement scheme for smart grid. Peer-to-Peer Netw Appl 15(3):1595–1616

    Article  Google Scholar 

  5. Kumar V, Kumar R, Pandey SK (2021) Lkm-ami: a lightweight key management scheme for secure two way communications between smart meters and han devices of ami system in smart grid. Peer-to-Peer Netw Appl 14:82–100

    Article  Google Scholar 

  6. Smart grid remote terminal units for decentralized energy resources (2023) https://www.smartgridtechnology.net/tag/microgrids/. online

  7. Borenstein S, Jaske M, Rosenfeld A (2002) Dynamic pricing, advanced metering, and demand response in electricity markets

  8. Australia’s NSW launches renewable energy auction (2022) https://renewablesnow.com/news/australias-nsw-launches-renewable-energy-auction-800010/. online

  9. Hassan MU, Rehmani MH, Chen J (2021) Optimizing blockchain based smart grid auctions: a green revolution. IEEE Trans Green Commun Netw 6(1):462–471

    Article  Google Scholar 

  10. Hart GW (1992) Nonintrusive appliance load monitoring. Proc IEEE 80(12):1870–1891

    Article  Google Scholar 

  11. Australia: OAIC finds Uber interfered with privacy rights (2021) https://www.dataguidance.com/news/australia-oaic-finds-uber-interfered-privacy-rights. online

  12. Wen M, Lu R, Lei J, Li H, Liang X, Shen X (2014) Sesa: an efficient searchable encryption scheme for auction in emerging smart grid marketing. Secur Commun Netw 7(1):234–244

    Article  Google Scholar 

  13. Fan K, Chen Q, Su R, Zhang K, Wang H, Li H, Yang Y (2021) Msiap: a dynamic searchable encryption for privacy-protection on smart grid with cloud-edge-end. IEEE Trans Cloud Comput

  14. Yang G, Tan CH, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test. In: Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings, Springer, pp 119–131

  15. Ma S, Zhou P, Huang Q, Wang J (2023) Mter: an efficient multi-user threshold equality retrieval for double auction in smart grid market. IEEE Trans Inform Forensics Secur

  16. Zhao Z, Susilo W, Wang B, Zeng K (2023) Public-key encryption with tester verifiable equality test for cloud computing. IEEE Trans Cloud Comput

  17. APR 2023 Auction (2023) https://www.pjm.com/markets-and-operations/data-dictionary. online

  18. Li D, Yang Q, Yu W, An D, Zhang Y, Zhao W (2019) Towards differential privacy-based online double auction for smart grid. IEEE Trans Inf Forensics Secur 15:971–986

    Article  Google Scholar 

  19. Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Annual international cryptology conference, Springer, pp 41–55

  20. Lee HT, Ling S, Seo JH, Wang H, Youn T-Y (2020) Public key encryption with equality test in the standard model. Inf Sci 516:89–108

    Article  MathSciNet  Google Scholar 

  21. Ma S, Huang Q, Zhang M, Yang B (2014) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458–470

    Article  Google Scholar 

  22. Ma S, Zhong Y, Huang Q (2022) Efficient public key encryption with outsourced equality test for cloud-based iot environments. IEEE Trans Inf Forensics Secur 17:3758–3772

    Article  Google Scholar 

  23. Lin H, Zhao G, Song S, Wu W, Jiang W (2023) A new lightweight public key encryption with equality test for cloud storage. Multimed Tool Appl:1–22

  24. The stanford pairing based crypto library (2006) https://crypto.stanford.edu/pbc/. online

  25. Li D, Yang Q, Yu W, An D, Yang X, Zhao W (2017) A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. In: 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), IEEE, pp 1–8

  26. Li D, Yang Q, An D, Yu W, Yang X, Fu X (2018) On location privacy-preserving online double auction for electric vehicles in microgrids. IEEE Internet Things J 6(4):5902–5915

    Article  Google Scholar 

  27. Abidin A, Aly A, Cleemput S, Mustafa MA (2016) An mpc-based privacy-preserving protocol for a local electricity trading market. In: Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings 15, Springer, pp 615–625

  28. Abidin A, Aly A, Cleemput S, Mustafa MA (2018) Secure and privacy-friendly local electricity trading and billing in smart grid. arXiv:1801.08354

  29. Sarenche R, Salmasizadeh M, Ameri MH, Aref MR (2021) A secure and privacy-preserving protocol for holding double auctions in smart grid. Inf Sci 557:108–129

    Article  MathSciNet  Google Scholar 

  30. Shi W, Bao Z, Wang J, Lu N, Zhu F, Shen J (2017) A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market. Pers Ubiquit Comput 21:779–789

    Article  Google Scholar 

  31. Zhang S, Ying X, Wang B (2023) A privacy protection scheme based on linkable ring signature for user payment of peer-to-peer uniform-price double auction transaction in the microgrid day-ahead market. Int J Electr Power Energy Syst 147:108806

    Article  Google Scholar 

  32. Boneh D, DiCrescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, Springer, pp 506–522

  33. Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Australasian conference on information security and privacy, Springer, pp 389–406

  34. Tang Q (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. Int J Appl Crypto 2(4):304–321

    Article  MathSciNet  Google Scholar 

  35. Tang Q (2012) Public key encryption supporting plaintext equality test and user-specified authorization. Secur Commun Netw 5(12):1351–1362

    Article  Google Scholar 

  36. Huang K, Tso R, Chen Y-C, Rahman SMM, Almogren A, Alamri A (2015) Pke-aet: public key encryption with authorized equality test. Comput J 58(10):2686–2697

    Article  Google Scholar 

  37. Zhang K, Chen J, Lee HT, Qian H, Wang H (2019) Efficient public key encryption with equality test in the standard model. Theoret Comput Sci 755:65–80

    Article  MathSciNet  Google Scholar 

  38. Ling Y, Ma S, Huang Q, Li X, Ling Y (2020) Group public key encryption with equality test against offline message recovery attack. Inf Sci 510:16–32

    Article  MathSciNet  Google Scholar 

  39. Susilo W, Guo F, Zhao Z, Wu G (2020) Pke-met: public-key encryption with multi-ciphertext equality test in cloud computing. IEEE Trans Cloud Comput 10(2):1476–1488

    Article  Google Scholar 

  40. Ling Y, Ma S, Huang Q, Li X (2018) A general two-server framework for ciphertext-checkable encryption against offline message recovery attack. In: International conference on cloud computing and security, Springer, pp 370–382

  41. Ma S, Ling Y (2018) A general two-server cryptosystem supporting complex queries. In: Information Security Applications: 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers 18, Springer, pp 249–260

  42. Chen B, He D, Kumar N, Wang H, Choo K-KR (2020) A blockchain-based proxy re-encryption with equality test for vehicular communication systems. IEEE Trans Netw Sci Eng 8(3):2048–2059

    Article  MathSciNet  Google Scholar 

Download references

Funding

This work was supported by the National Natural Science Foundation of China (62372285), Shanghai Rising-Star Program (22QA1403800), Natural Science Foundation of Shanghai (22ZR1427100) and the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (No. SKLACSS-202310).

Author information

Authors and Affiliations

Authors

Contributions

Kai Zhang, Ludan Lu and Lifei Wei designed the algorithm and presented security analysis. Ludan Lu and Jian Zhao conducted the experiment. Kai Zhang, Lifei Wei and Jianting Ning wrote the main manuscript text. All authors reviewed the manuscript.

Corresponding author

Correspondence to Lifei Wei.

Ethics declarations

Ethics statement

This article does not contain any studies with human participants or animals performed by any of the authors.

Competing interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: Special Issue on 2 - Track on Security and Privacy

Guest Editors: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, K., Lu, L., Zhao, J. et al. Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid. Peer-to-Peer Netw. Appl. 17, 3255–3268 (2024). https://doi.org/10.1007/s12083-024-01744-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01744-5

Keywords