ỨNG DỤNG MÃ HÓA ĐỒNG CẤU ĐẦY ĐỦ TRONG VIỆC BẢO VỆ VÀ XỬ LÝ DỮ LIỆU TIÊU THỤ ĐIỆN TRONG CÁC TÒA NHÀ THÔNG MINH
Thông tin bài báo
Ngày nhận bài: 10/04/25                Ngày hoàn thiện: 21/05/25                Ngày đăng: 22/05/25Tóm tắt
Từ khóa
Toàn văn:
PDF (English)Tài liệu tham khảo
[1] S. Fatima et al., “Comparative Analysis of Aes and Rsa Algorithms for Data Security in Cloud Computing,” Eng. Proc., vol. 20, no. 1, Art. no. 1, Jul. 2022, doi: 10.3390/engproc2022020014.
[2] U. Mattsson, “Security and Performance of Homomorphic Encryption,” Global Security Mag Online, 2021. [Online]. Available: https://www.globalsecuritymag.com/Security-and-Performance-of,20210601, 112333.html. [Accessed Mar. 23, 2025].
[3] S. Z. E. Mestari, G. Lenzini, and H. Demirci, “Preserving data privacy in machine learning systems,” Comput. Secur., vol. 137, Feb. 2024, Art. no. 103605, doi: 10.1016/j.cose.2023.103605.
[4] S. Burtner, “Homomorphic Encryption for Electrical Metering Aggregation: Protecting the Privacy of Building Tenants,” Pacific Northwest National Laboratory, Sep. 2024.
[5] D. Strepparava, F. Rosato, L. Nespoli, and V. Medici, “Privacy and Auditability in the Local Energy Market of an Energy Community with Homomorphic Encryption,” Energies, vol. 15, no. 15, Art. no. 15, Jul. 2022, doi: 10.3390/en15155386.
[6] F. D. Garcia and B. Jacobs, “Privacy-Friendly Energy-Metering via Homomorphic Encryption,” in Security and Trust Management, J. Cuellar, J. Lopez, G. Barthe, and A. Pretschner, Eds., Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 226–238.
[7] D. Mitrea et al., “Smart contracts and homomorphic encryption for private P2P energy trading and demand response on blockchain,” Heliyon, vol. 9, no. 11, Nov. 2023, doi: 10.1016/j.heliyon.2023.e22357.
[8] S. Abdelkader et al., “Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks,” Results Eng., vol. 23, Sep. 2024, Art. no. 102647, doi: 10.1016/j.rineng.2024.102647.
[9] B. Li, M. Xu, Y. Zhou, H. Liu, and R. Zhang, “Optimization of Security Identification in Power Grid Data through Advanced Encryption Standard Algorithm,” J. Cyber Secur. Mobil., vol. 13, no. 02, pp. 239–264, Feb. 2024, doi: 10.13052/jcsm2245-1439.1323.
[10] N. Kshetri et al., “algoTRIC: Symmetric and asymmetric encryption algorithms for Cryptography - A comparative analysis in AI era,” arXiv: arXiv:2412.15237, Dec. 12, 2024, doi: 10.48550/arXiv.2412.15237.
[11] M. Zhao E and Y. Geng, “Homomorphic Encryption Technology for Cloud Computing,” Procedia Comput. Sci., vol. 154, pp. 73–83, Jan. 2019, doi: 10.1016/j.procs.2019.06.012.
[12] G. Crihan et al., “A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information,” Inventions, vol. 8, no. 4, Aug. 2023, Art. no. 4, doi: 10.3390/inventions8040102.
[13] J. W. Bos, W. Castryck, I. Iliashenko, and F. Vercauteren, “Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling,” 2016. [Online]. Available: https://eprint.iacr.org/2016/1117. [Accessed May 04, 2025].
[14] X. Zhang, C. Xu, C. Jin, R. Xie, and J. Zhao, “Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme,” Future Gener. Comput. Syst., vol. 36, pp. 180–186, Jul. 2014, doi: 10.1016/j.future.2013.10.024.
[15] O. Regev, “On Lattices, Learning with Errors, Random Linear Codes, and Cryptography,” arXiv: arXiv:2401.03703, Jan. 08, 2024, doi: 10.48550/arXiv.2401.03703.
[16] A. Satriawan et al., “Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations,” IEEE Access, vol. 11, pp. 70288–70316, 2023, doi: 10.1109/ACCESS.2023.3294446.
[17] T. Krause, R. Ernst, B. Klaer, I. Hacker, and M. Henze, “Cybersecurity in Power Grids: Challenges and Opportunities,” Sensors, vol. 21, no. 18, Sep. 2021, Art. no. 6225, doi: 10.3390/s21186225.
[18] S. Erabelli, “pyFHE - a Python library for fully homomorphic encryption,” M. E. Thesis, Massachusetts Institute of Technology, 2020. [Online]. Available: https://dspace.mit.edu/handle/1721.1/129204. [Accessed Apr. 01, 2025].
[19] W. Redmond, “Microsoft SEAL: Fast and Easy-to-Use Homomorphic Encryption Library,” Microsoft Research, 2023. [Online]. Available: https://www.microsoft.com/en-us/research/project/microsoft-seal/. [Accessed May 14, 2025].
DOI: https://doi.org/10.34238/tnu-jst.12527
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu





