[1] DILEEP G. A survey on smart grid technologies and applications[J]. Renewable Energy,2020,146:2589-2625. [2] ZHOU K, FU C, YANG S. Big data driven smart energy management:from big data to big insights[J]. Renewable and Sustainable Energy Reviews,2016,56:215-225. [3] HOSSAIN E,KHAN I,UN-NOOR F,et al. Application of big data and machine learning in smart grid, and associated security concerns:a review[J]. IEEE Access,2019,7:13960-13988. [4] MUHAMMED Z G,RESUL D. Cyber-security on smart grid:threats and potential solutions[J]. Computer Networks,2020, 169:No. 107094. [5] KUMAR V, INBARAJ P. Overview on cyber security threats involved in the implementation of smart grid in countries like india[C]//Proceedings of the 2018 International conference on Computer Networks,Big data and IoT. Springer,Cham,2018:678-684. [6] AHMED S, GONDAL T M, ADIL M, et al. A survey on communication technologies in smart grid[C]//Proceedings of the 2019 IEEE PES GTD Grand International Conference and Exposition Asia. Piscataway:IEEE,2019:7-12. [7] ZHENG Z,XIE S,DAI H,et al. An overview of blockchain technology:architecture, consensus, and future trends[C]//Proceedings of the 2017 IEEE International Congress on Big Data. Piscataway:IEEE,2017:557-564. [8] KUMAR R, TRIPATHI R. Implementation of distributed file storage and access framework using IPFS and blockchain[C]//Proceedings of the 5th International Conference on Image Information Processing. Piscataway:IEEE,2019:246-251. [9] ADEYEMI A,YAN M,SHAHIDEHPOUR M,et al. Blockchain technology applications in power distribution systems[J]. The Electricity Journal,2020,33(8):No. 106817. [10] CHAUDHARY P,GUPTA R,SINGH A,et al. Analysis and comparison of various fully homomorphic encryption techniques[C]//Proceedings of the 2019 International Conference on Computing,Power and Communication Technologies. Piscataway:IEEE,2019:58-62. [11] WANG X, HU A, FANG H. Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice[J]. IET Information Security,2020,14(3):342-351. [12] ZHANG X,CHEN X. Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network[J]. IEEE Access,2019,7:58241-58254. [13] NIZAMUDDIN N, SALAH K, AJMAL AZAD M, et al. Decentralized document version control using Ethereum blockchain and IPFS[J]. Computers and Electrical Engineering, 2019,76:183-197. [14] LÓPEZ D,FAROOQ B. A multi-layered blockchain framework for smart mobility data-markets[J]. Transportation Research Part C:Emerging Technologies,2020,111:588-615. [15] TERZI D S,TERZI R,SAGIROGLU S. A survey on security and privacy issues in big data[C]//Proceedings of the 10th International Conference for Internet Technology and Secured Transactions. Piscataway:IEEE,2015:202-207. [16] ZHOU L,WANG L,SUN Y,et al. AntNest:fully non-interactive secure multi-party computation[J]. IEEE Access, 2018, 6:75639-75649. [17] NARAYANAN U, PAUL V, JOSEPH S. A novel system architecture for secure authentication and data sharing in cloud enabled big data environment[J/OL]. Journal of King Saud University-Computer and Information Sciences[2020-05-02]. https://doi.org/10.1016/j.jksuci.2020.05.005. [18] GUO C,JIANG X,CHOO K K R,et al. Lightweight privacy preserving data aggregation with batch verification for smart grid[J]. Future Generation Computer Systems,2020,112:512-523. [19] JIANG L,GUO D. Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage[J]. IEEE Access,2017,5:13336-13345. [20] SUN M,GE C,FANG L,et al. A proxy broadcast re-encryption for cloud data sharing[J]. Multimedia Tools and Applications, 2018,77(9):10455-10469. [21] 罗文俊, 闻胜莲, 程雨. 基于区块链的电子医疗病历共享方案[J]. 计算机应用,2020,40(1):157-161.(LUO W J,WEN S L,CHENG Y. Blockchain-based electronic health record sharing scheme[J]. Journal of Computer Applications,2020,40(1):157-161.) [22] PATSAKIS C,CASINO F. Hydras and IPFS:a decentralised playground for malware[J]. International Journal of Information Security,2019,18(6):787-799. [23] ULLAH Z,ZEB A,ULLAH I,et al. Certificateless Proxy ReEncryption Scheme (CPRES) based on hyperelliptic curve for access control in Content-Centric Network (CCN)[J]. Mobile Information Systems,2020,2020:No. 4138516. [24] VU D H,LUONG T D,HO T B. An efficient approach for secure multi-party computation without authenticated channel[J]. Information Sciences,2020,527:356-368. [25] LIU Y,ZHAO Q. E-voting scheme using secret sharing and kanonymity[J]. World Wide Web,2019,22(4):1657-1667. [26] BADRINARAYANAN S, SRINIVASAN A. Revisiting nonmalleable secret sharing[C]//Proceedings of the 2019 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS, 11476. Cham:Springer, 2019:593-622. [27] ZHOU Y,YU J,YAN Z,et al. Quantum secret sharing among four players using multipartite bound entanglement of an optical field[J]. Physical Review Letters,2018,121(15):No. 150502. [28] SHAMIR A. How to share a secret[J]. Communications of the ACM,1979,22(11):612-613. [29] 谭海波, 周桐, 赵赫, 等. 基于区块链的档案数据保护与共享方法[J]. 软件学报,2019,30(9):2620-2635.(TAN H B,ZHOU T,ZHAO H,et al. Archival data protection and sharing method based on blockchain[J]. Journal of Software,2019,30(9):2620-2635.) [30] ZHAO C, ZHAO S, ZHAO M, et al. Secure multi-party computation:theory,practice and applications[J]. Information Sciences,2019,476:357-372. |