2021
DOI: 10.1088/1742-6596/1754/1/012076
|View full text |Cite
|
Sign up to set email alerts
|

Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge Computing*

Abstract: With the continuous deepening of China's power grid intelligent upgrading and the rise of edge computing technology, power grid terminals can carry out data storage and intelligent calculation at the edge of the power grid. However, the generated data by users may cause the leakage of user privacy information. The power grid edge system can retrieve the user's electricity data on demand, so as to improve the level of privacy protection and reduce the demand of transmission and computing resources through the l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Li et al [23] proposed a searchable symmetric encryption scheme applied in smart grid data in 2019, similar to [5] using pseudo-random functions to construct the scheme with simplicity and ease of updating. Zhu et al [24] improved the scheme of [23] by adding multikeyword and fuzzy keyword search using the N-Gram algorithm and Hamming distance in 2021. Moreover, some searchable encryption schemes were constructed based on the Bloom flter principle [4,25,26], but most of them directly use the Bloom flter as the index, which is not easy to update and have false positive.…”
Section: Introductionmentioning
confidence: 99%
“…Li et al [23] proposed a searchable symmetric encryption scheme applied in smart grid data in 2019, similar to [5] using pseudo-random functions to construct the scheme with simplicity and ease of updating. Zhu et al [24] improved the scheme of [23] by adding multikeyword and fuzzy keyword search using the N-Gram algorithm and Hamming distance in 2021. Moreover, some searchable encryption schemes were constructed based on the Bloom flter principle [4,25,26], but most of them directly use the Bloom flter as the index, which is not easy to update and have false positive.…”
Section: Introductionmentioning
confidence: 99%