{"id":"https://openalex.org/W4414126718","doi":"https://doi.org/10.1007/s10586-025-05354-5","title":"Privacy-preserving data aggregation in smart grid based on multi-key homomorphic encryption and blockchain","display_name":"Privacy-preserving data aggregation in smart grid based on multi-key homomorphic encryption and blockchain","publication_year":2025,"publication_date":"2025-09-11","ids":{"openalex":"https://openalex.org/W4414126718","doi":"https://doi.org/10.1007/s10586-025-05354-5"},"language":"en","primary_location":{"id":"doi:10.1007/s10586-025-05354-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10586-025-05354-5","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018915353","display_name":"Huiyong Wang","orcid":"https://orcid.org/0000-0001-5886-9647"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huiyong Wang","raw_affiliation_strings":["Center for Applied Mathematics of Guangxi, Guilin University of Electronic Technology, Guilin, 541004, China","School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Center for Applied Mathematics of Guangxi, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935","https://openalex.org/I38706770"]},{"raw_affiliation_string":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117736045","display_name":"Meiling Bu","orcid":null},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meiling Bu","raw_affiliation_strings":["Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, Guilin University of Electronic Technology, Guilin, 541004, China","School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102745169","display_name":"Jielian Feng","orcid":"https://orcid.org/0000-0002-0786-3541"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jielian Feng","raw_affiliation_strings":["Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, Guilin University of Electronic Technology, Guilin, 541004, China","School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078775578","display_name":"Yong Ding","orcid":"https://orcid.org/0000-0002-3571-7576"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ding","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","Institute of Cyberspace Technology, HKCT Institute for Higher Education, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Institute of Cyberspace Technology, HKCT Institute for Higher Education, Hong Kong, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101890868","display_name":"Shijie Tang","orcid":"https://orcid.org/0000-0002-3954-9944"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijie Tang","raw_affiliation_strings":["School of Electronic Engineering and Automation, GuiLin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering and Automation, GuiLin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100700688","display_name":"Yujue Wang","orcid":"https://orcid.org/0000-0002-0951-8880"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujue Wang","raw_affiliation_strings":["Hangzhou Innovation Institute, Beihang University, Hangzhou, 310052, China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Innovation Institute, Beihang University, Hangzhou, 310052, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5018915353"],"corresponding_institution_ids":["https://openalex.org/I38706770","https://openalex.org/I5343935"],"apc_list":{"value":2190,"currency":"EUR","value_usd":2790},"apc_paid":null,"fwci":2.385,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91101991,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"28","issue":"11","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8205000162124634},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5795000195503235},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.5504999756813049},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5442000031471252},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.4805000126361847},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.47749999165534973},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47040000557899475},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45100000500679016},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.39149999618530273},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.38350000977516174}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8733000159263611},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8205000162124634},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5795000195503235},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.5504999756813049},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5442000031471252},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48080000281333923},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.4805000126361847},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.47749999165534973},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47040000557899475},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45100000500679016},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41749998927116394},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.39149999618530273},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.38350000977516174},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3799999952316284},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.357699990272522},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.352400004863739},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.337799996137619},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3246999979019165},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.32280001044273376},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.32109999656677246},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.31850001215934753},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.3133000135421753},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.31060001254081726},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.29980000853538513},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2915000021457672},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.28929999470710754},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.2808000147342682},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.27630001306533813},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.2687000036239624},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.2621000111103058},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.2590999901294708},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25429999828338623}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10586-025-05354-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10586-025-05354-5","pdf_url":null,"source":{"id":"https://openalex.org/S106148199","display_name":"Cluster Computing","issn_l":"1386-7857","issn":["1386-7857","1573-7543"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cluster Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1571926107","https://openalex.org/W1992490934","https://openalex.org/W2036378739","https://openalex.org/W2048994663","https://openalex.org/W2055817410","https://openalex.org/W2141420453","https://openalex.org/W2169194339","https://openalex.org/W2405356014","https://openalex.org/W2553455317","https://openalex.org/W2576210365","https://openalex.org/W2597998853","https://openalex.org/W2789659149","https://openalex.org/W2798145568","https://openalex.org/W2811423811","https://openalex.org/W2892127892","https://openalex.org/W3048383079","https://openalex.org/W3086819744","https://openalex.org/W4362727345","https://openalex.org/W4383200239","https://openalex.org/W4383503525","https://openalex.org/W4385453656","https://openalex.org/W4386233465","https://openalex.org/W4388347301","https://openalex.org/W4402857403","https://openalex.org/W4404122490","https://openalex.org/W4405022895","https://openalex.org/W4405495033"],"related_works":["https://openalex.org/W4316659877","https://openalex.org/W3035389378","https://openalex.org/W2607647996","https://openalex.org/W1970057761","https://openalex.org/W3183645941","https://openalex.org/W2911298733","https://openalex.org/W2949835517","https://openalex.org/W1540514112","https://openalex.org/W2292786713","https://openalex.org/W3163109844"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
