Font Size: a A A

Research On Cryptographic Theory Of User Information Protection In Smart Grid

Posted on:2017-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:F ChenFull Text:PDF
GTID:2308330488497103Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Recently, smart grid has gradually been the hot spot of research as the result of development of future grid. Smart grid can be compatible with all kinds of power generation mode to solute contradiction between supply and demand effectively. With full exchange of information among all users, it makes smart grid possible to resist attacks and repair itself promptly. But the pattern of users can reveal information of user’s usage and specific activity from users which not only expose users’ sesitive information but also provide oppotunities for malicious party to attact smart grid users. Also, large-scale access from variety of users and bidirectional information exchange in smart grid make it possible for data stored in system to be retrieved and used by malicious one. All these situations draw increasing attention to pivacy protection in field of smart grid.This thesis proposes two kinds of cryptographic schemes based on attritute and identity seperately after studying methods in information transmission and access control in smart grid. First of all, the thesis describes the definition and general infrastructure of smart grid. And then it discusses security challenges smart grid is confronted and analysizes recent research status of smart grid security domain. An Online/Offline CP-ABE Encryption scheme with Hidden Policy is present on the basis of scheme raised by J. Hur, after which a pairing-free ID based multi-recipient hybrid signcryption is put forward. The dissertation describes the two schemes mentioned above, analyzes their correctness, efficiency and security performances in theory and then compares them with other schemes. Finally, algorithms of both schemes proposed in the thesis are implemented and their corresponding results are statistically analysized to verify the security and effeciency of these schemes.
Keywords/Search Tags:Bilinear Pairing, Attribute-based Encryption, Identity-based Signcryption, Smart Grid, Hybrid Signcryption, online/offline
PDF Full Text Request
Related items